Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living (AAL) systems and services, EvAAL 2011, which was organized in two major events, the Competition in Valencia, Spain, in July 2011, and the Final workshop in Lecce, Italy, in September 2011. The papers included in this book describe the organization and technical aspects of the competition, and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of adaptive control systems; automotive systems; estimation and identification; intelligent visual systems; application of differential geometry in robotic mechanisms; unmanned systems technologies and applications; new development on health management, fault diagnosis, and fault-tolerant control; biomechatronics; intelligent control of mechanical and mechatronic systems.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
This book constitutes the proceedings of the 18th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Raesfeld, Germany, in September 2012. The 9 revised papers presented together with 12 short papers were carefully reviewed and selected from numerous submissions. They are grouped into five themes that represent collaborative learning, social media analytics, conceptual and design models, formal modeling and technical approaches and collaboration support in emergency scenarios.
This book constitutes the refereed proceedings of the 12 th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012. The 16 full papers presented were carefully selected from 72 submissions. Topics addressed include anonymization of statistics, content, and traffic, network traffic analysis, censorship-resistant systems, user profiling, training users in privacy risk management, and privacy of internet and cloud-bases services. A further highlight is the HotPETS session, designed as a venue to present existing but still preliminary and evolving ideas.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.
This book constitutes the refereed proceedings of the Third International Symposium on Information Management in a Changing World, IMCW 2012, held in Ankara, Turkey, in September 2012. The 16 revised full papers presented together with three keynotes were carefully reviewed and selected from more than 30 submissions. The papers are organized in topical sections on e-science and information management; scholarly communication and institutional repositories; information literacy and academic libraries; different perspectives on information management.
Information behavior has emerged as an important aspect of human life, however our knowledge and understanding of it is incomplete and underdeveloped scientifically. Research on the topic is largely contemporary in focus and has generally not incorporated results from other disciplines. In this monograph Spink provides a new understanding of information behavior by incorporating related findings, theories and models from social sciences, psychology and cognition. In her presentation, she argues that information behavior is an important instinctive sociocognitive ability that can only be fully understood with a highly interdisciplinary approach. The leitmotivs of her examination are three important research questions: First, what is the evolutionary, biological and developmental nature of information behavior? Second, what is the role of instinct versus environment in shaping information behavior? And, third, how have information behavior capabilities evolved and developed over time? Written for researchers in information science as well as social and cognitive sciences, Spink's controversial text lays the foundation for a new interdisciplinary theoretical perspective on information behavior that will not only provide a more holistic framework for this field but will also impact those sciences, and thus also open up many new research directions.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012. The 99 papers (56 full papers, 32 short papers, and 11 demo papers) presented were carefully reviewed and selected from 153 submissions. Part I contains the full papers whereas Part II contains the short papers and the demo papers.
Online communities are among the most obvious manifestations of social networks based on new media technology. Facilitating ad-hoc communication and leveraging collective intelligence by matching similar or related users have become important success factors in almost every successful business plan. Researchers are just beginning to understand virtual communities and collaborations among participants currently proliferating across the world. Virtual Communities, Social Networks and Collaboration covers cutting edge research topics of utmost real-world importance in the specific domain of social networks. This volume focuses on exploring issues relating to the design, development, and outcomes from electronic groups and online communities, including: - The implications of social networking, - Understanding of how and why knowledge is shared among participants, - What leads to participation, effective collaboration, co-creation and innovation, - How organizations can better utilize the potential benefits of communities in both internal operations, marketing, and new product development.
This book constitutes the refereed proceedings of the 4th International Conference on Well-Being in the Information Society, WIS 2012, held in Turku, Finland, in August 2012. The 13 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-health; measuring and documenting health and well-being; empowering and educating citizens for healthy living and equal opportunities; governance for health; safe and secure cities; information society as a challenge and a possibility for aged people.
The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012. The 147 revised full papers and 42 short papers were carefully reviewed and selected from 364 submissions. The papers included in the second volume are organized in the following topical sections: portable and mobile systems in assistive technology; assistive technology, HCI and rehabilitation; sign 2.0: ICT for sign language users: information sharing, interoperability, user-centered design and collaboration; computer-assisted augmentative and alternative communication; easy to Web between science of education, information design and speech technology; smart and assistive environments: ambient assisted living; text entry for accessible computing; tactile graphics and models for blind people and recognition of shapes by touch; mobility for blind and partially sighted people; and human-computer interaction for blind and partially sighted people.
This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012. The 17 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 126 submissions. The book also features two keynote lectures which were given at the conference. The papers are organized in topical sections named: process quality; conformance and compliance; BPM applications; process model analysis; BPM and the cloud; requirements and performance; process mining; and refactoring and optimization.
This book constitutes the refereed proceedings of the 7th International Conference on Haptic and Audio Interaction Design, HAID 2012, held in Lund, Sweden, in August 2012. The 15 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on haptics and audio in navigation, supporting experiences and activities, object and interface, test and evaluation.
This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012. The 28 revised papers presented were carefully reviewed and selected from 138 submissions. The contributions are grouped into the following topical sections: activity capturing; urban mobility and computing; home and energy; HCI; development tools and devices; indoor location and positioning; social computing and games; privacy; public displays and services.
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 16th issue of the Transactions on Computational Science journal contains 11 extended versions of selected papers from Cyberworlds 2011, held in Banff, AB, Canada, in October 2011. The topics span the areas of haptic modeling, shared virtual worlds, virtual reality, human-computer interfaces, e-learning in virtual collaborative spaces, multi-user web games, cybersecurity, social networking, and art and heritage in cyberspaces.
This book constitutes the refereed proceedings of the 3 rd International ICST Conference on IT Revolutions, held in Cordoba, Spain in March 2011. The 20 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in topical sections on eGreen energy, smart buildings, health and ambient assisted living, smart environments and user experience, grid and cloud computing, eLearning.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012. The 21 revised full papers presented together with 3 short papers and 4 workshop and tutorial papers were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on process focused software process improvement, open-source agile and lean practices, product and process measurements and estimation, distributed and global software development, quality assessment, and empirical studies.
This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
Back in 1983 I was chatting with Dick Coleman, publisher of Traffic World magazine, when he unexpectedly proposed that I write a column for the magazine on computer applications in the transportation/physical distribution industry. "But, Dick, I don't know all that much about computers," I protested. "You use one, don't you?" he asked logically. Yes, I did; I'd been running my consulting business with it for two years. But that didn't, I explained, make me an expert. "Think about it," he said. That's typical Coleman; he drops these studiedly casual ideas and just lets them lay there until you pick them up and wind up doing just what he wanted you to do all along. Sure enough, the longer I pondered the notion the more it appealed to me. OK, I wasn't a computer expert (I'm still not). But I was a computer user, in the transportation/distribution field; maybe from that perspective I might have some useful things to say to other transportation/distribution users and would-be users of computers. Thus was born the "Computer Software for Transportation" column. The first one appeared in the April 11, 1983, issue of Traffic World, and it's been a once-a-month schedule ever since. And thus, too, was ultimately born this book.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012. The 16 long papers, 6 short papers and 21 poster abstracts presented were carefully reviewed and selected from 83 submissions. The papers are organized in keynotes, tutorial, workshops, graduate student symposium and topical sections on psychological and cognitive issues, diagram layout, diagrams and data analysis, Venn and Euler diagrams, reasoning with diagrams, investigating aesthetics, applications of diagrams. |
You may like...
Facing Internet Technology and Gaming…
Hilarie Cash, Cosette Rae, …
Paperback
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,732
Discovery Miles 27 320
|