![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Green Communication and Networking (GreeNets 2011), held in Colmar, France, on October 5-7, 2011. The 16 revised full papers presented were carefully selected and reviewed from numerous submissions and explain the scope and challenges of designing, building, and deploying GreeNets. In this regard, the conference aims to establish a forum to bring together research professionals from diverse fields including green mobile networks, system architectures, networking & communication protocols, applications, test-bed and prototype, traffic balance and energy-efficient cooperation transmission, system and application issues related to GreenNets.
This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.
This book constitutes the refereed proceedings of the 7th
International Conference on Information Security Practice and
Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book constitutes the refereed proceedings of the 5th
International Conference on Information Theoretic Security, held in
Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the 12 International Conference on Product-Focused Software Process Improvement, PROFES 2011, held in Torre Canne, Italy, in June 2011. The 24 revised full papers presented together with the abstracts of 2 keynote addresses were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on agile and lean practices, cross-model quality improvement, global and competitive software development, managing diversity, product and process measurements, product-focused software process improvement, requirement process improvement, and software process improvement.
This book constitutes the refereed proceedings of the 12 th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012. The 16 full papers presented were carefully selected from 72 submissions. Topics addressed include anonymization of statistics, content, and traffic, network traffic analysis, censorship-resistant systems, user profiling, training users in privacy risk management, and privacy of internet and cloud-bases services. A further highlight is the HotPETS session, designed as a venue to present existing but still preliminary and evolving ideas.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012. The 99 papers (56 full papers, 32 short papers, and 11 demo papers) presented were carefully reviewed and selected from 153 submissions. Part I contains the full papers whereas Part II contains the short papers and the demo papers.
This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 16th issue of the Transactions on Computational Science journal contains 11 extended versions of selected papers from Cyberworlds 2011, held in Banff, AB, Canada, in October 2011. The topics span the areas of haptic modeling, shared virtual worlds, virtual reality, human-computer interfaces, e-learning in virtual collaborative spaces, multi-user web games, cybersecurity, social networking, and art and heritage in cyberspaces.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011. The 48 papers and 3 keynotes presented in this volume were carefully reviewed and selected from 88 submissions. The papers cover a wide range of topics including social network analysis; modeling; machine learning and data mining; social behaviors; public health; cultural aspects; and effects and search.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012. The 16 long papers, 6 short papers and 21 poster abstracts presented were carefully reviewed and selected from 83 submissions. The papers are organized in keynotes, tutorial, workshops, graduate student symposium and topical sections on psychological and cognitive issues, diagram layout, diagrams and data analysis, Venn and Euler diagrams, reasoning with diagrams, investigating aesthetics, applications of diagrams.
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
We are very pleased to introduce Open Source Development, Communities and Quality. The International Conference on Open Source Systems has come to its fourth edition - OSS 2008. Now, Free, Libre, and Open Source software is by all means now one of the most relevant subjects of study in several disciplines, ranging from information technology to social sciences and including also law, business, and political sciences. There are several conference tracks devoted to open source software with several publications appearing in high quality journals and magazines. OSS 2008 has been organized with the purpose of being the reference venue for those working in this area, being the most prominent conference in this area. For this th reason OSS 2008 has been located within the frameworks of the 20 World Computer Congress, WCC 2008, in Milan, the largest event of IFIP in 2008. We believe that this conference series, and the IFIP working group it represents, can play an important role in meeting these challenges, and hope that this book will become a valuable contribution to the open source body of research.
This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. The contributed papers explore technology design and use in organizations, and consider the processes that engender social exclusion along with the issues that derive from it. The conference, sponsored by the International Federation for Information Processing Working Group 8.2, was held in Limerick, Ireland, in July, 2006.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
This book constitutes the thoroughly refereed proceedings of the First International Workshop on the Theory and Applications of Formal Argumentation, TAFA 2011, held in Barcelona, Spain, in Juli 2011, as a workshop at IJCAI 2011, the 22nd International Joint Conference on Artificial Intelligence. The 9 revised full papers presented together with 8 revised poster papers were carefully selected during two rounds of reviewing and improvement from 32 initial submissions. The workshop promotes and fosters uptake of argumentation as a viable AI paradigm with wide ranging application, and provides a forum for further development of ideas and the initiation of new and innovative collaborations. The papers cover the following topics: properties of formal models of argumentation; instantiations of abstract argumentation frameworks; relationships among different argumentation frameworks; practical applications of formal models of argumentation; argumentation and other artificial intelligence techniques; evaluation of formal models of argumentation; validation and evaluation of applications of argumentation.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011. The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration.
Electronic business, the integration of IT and the Internet into business processes, has begun to completely revolutionize business and the economy. The aim of this book is to point out the challenges and opportunities Europe and its companies are faced with in electronic business. The material is based upon the authors joint experience of years of research into the use of IT in business, industry, and government, as well as their management experience as President and CEO of leading technology organizations.
Web search engines are not just indispensable tools for finding and accessing information online, but have become a defining component of the human condition and can be conceptualized as a complex behavior embedded within an individual's everyday social, cultural, political, and information-seeking activities. This book investigates Web search from the non-technical perspective, bringing together chapters that represent a range of multidisciplinary theories, models, and ideas.
ED-L2L, Learning to Live in the Knowledge Society, is one of the co-located conferences of the 20th World Computer Congress (WCC2008). The event is organized under the auspices of IFIP (International Federation for Information Processing) and is to be held in Milan from 7th to 10th September 2008. ED-L2L is devoted to themes related to ICT for education in the knowledge society. It provides an international forum for professionals from all continents to discuss research and practice in ICT and education. The event brings together educators, researchers, policy makers, curriculum designers, teacher educators, members of academia, teachers and content producers. ED-L2L is organised by the IFIP Technical Committee 3, Education, with the support of the Institute for Educational Technology, part of the National Research Council of Italy. The Institute is devoted to the study of educational innovation brought about through the use of ICT. Submissions to ED-L2L are published in this conference book. The published papers are devoted to the published conference themes: Developing digital literacy for the knowledge society: information problem solving, creating, capturing and transferring knowledge, commitment to lifelong learning Teaching and learning in the knowledge society, playful and fun learning at home and in the school New models, processes and systems for formal and informal learning environments and organisations Developing a collective intelligence, learning together and sharing knowledge ICT issues in education - ethics, equality, inclusion and parental role Educating ICT professionals for the global knowledge society Managing the transition to the knowledge society
As we approach the beginning of the 21 st century, we are beginning to see the emer gence of knowledge management as a natural evolution of the focus and importance of quality in the 1980s and reengineering in the I 990s. Quality placed a huge em phasis on getting all employees to use their brainpower better. Reengineering em phasized the use of technology to streamline business processes and take out costs. With the lessons of quality and reengineering firmly embedded in our everyday op erations (continual cost containment and higher quality is a way of life), businesses are now turning their attention to growth. Growth is a common pursuit. Customers are calling for it. Financial markets are calling for it. Employees are asking for it because they want an exciting and stimu lating environment in which to work. If a business doesn't grow, it will eventually die because knowledge workers ofthe 21 st century won't want to work with or for a business that's not growing. Skilled workers have plenty of options to choose from as demand for knowledge workers escalates around the world."
The application of new computational techniques and visualisation technologies in the Arts and Humanities are resulting in fresh approaches and methodologies for the study of new and traditional corpora. This 'computational turn' takes the methods and techniques from computer science to create innovative means of close and distant reading. This book discusses the implications and applications of 'Digital Humanities' and the questions raised when using algorithmic techniques. Key researchers in the field provide a comprehensive introduction to important debates surrounding issues such as the contrast between narrative versus database, pattern-matching versus hermeneutics, and the statistical paradigm versus the data mining paradigm. Also discussed are the new forms of collaboration within the Arts and Humanities that are raised through modular research teams and new organisational structures, as well as techniques for collaborating in an interdisciplinary way.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.
Avatars at Work and Play brings together contributions from leading social scientists and computer scientists who have conducted research on virtual environments used for collaboration and online gaming. They present a well-rounded and state-of-the-art overview of current applications of multi-user virtual environments, ranging from highly immersive virtual reality systems to internet-based virtual environments on personal computers. The volume is a follow-up to a previous essay collection, The Social Life of Avatars, which explored general issues in this field. This collection goes further, examining uses of shared virtual environments in practical settings such as scientific collaboration, distributed meetings, building models together, and others. It also covers online gaming in virtual environments, which has attracted hundreds of thousands of users and presents an opportunity for studying a myriad of social issues. Covering both work and play, the volume brings together issues common to the two areas, including: What kind of avatar appearance is suitable for different kinds of interaction? How best to foster collaboration and promote usable shared virtual spaces? What kinds of activities work well in different types of virtual environments and systems? Avatars at Work and Play will be required reading for computer scientists and social scientists who are researching and developing virtual worlds. It will be useful on courses in New Media and human-computer interaction" |
You may like...
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,311
Discovery Miles 73 110
Large-Scale Data Streaming, Processing…
Hemraj Saini, Geetanjali Rathee, …
Hardcover
R6,163
Discovery Miles 61 630
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, …
Hardcover
R5,297
Discovery Miles 52 970
|