0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (24)
  • R250 - R500 (190)
  • R500+ (2,625)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007): Friedrich L. Bauer Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007)
Friedrich L. Bauer
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

Internet and Network Economics - 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings... Internet and Network Economics - 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings (Paperback, 2008 ed.)
Christos Papadimitriou, Shuzhong Zhang
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

This volume contains the papers presented at the International Workshop on Internet and Network Economics held during December 17-20, 2008, in Sha- hai, China, for its fourth edition. WINE 2008 provided a forum for researchers from di?erent disciplines to communicate with each other and exchange their researching ?ndings in this emerging ?eld. WINE 2008hadteninvitedspeakers: FanChungGraham, MatthewJackson, Lawrence Lau, Tom Luo, Eric Maskin, Paul Milgrom, Christos Papadimitriou, Herbert Scarf, Hal Varian and Yinyu Ye. There were 126 submissions. Each submission was reviewed on average by 2. 5 Programme Committee members. The Committee decided to accept 68 papers. The programme also included 10 invited talks. This ?nal program contained papers covering topics including equilibrium, information markets, sponsored auction, network economics, mechanism - sign, socialnetworks, advertisementpricing, computationalequilibrium, network games, algorithms and complexity for games. December 2008 Christos Papadimitriou Shuzhong Zhang Organization Programme Chairs Conference Chair Herbert E. Scarf (Yale University) Program Co-chair Christos Papadimitriou (UC Berkeley) Program Co-chair Shuzhong Zhang (Chinese University of Hong Kong) Local Organizing Committee Chairs Committee Chair Yifan Xu (Fudan University) Committee Co-chair Duan Li (Chinese University of Hong Kong) Committee Co-chair ShouyangWang(ChineseAcademyofSciences) Committee Co-chair Xiaoping Zhao (SSE INFONE

Advances in Social Computing - Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP... Advances in Social Computing - Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP 2010, Bethesda, MD, USA, March 30-31, 2010, Proceedings (Paperback, Edition.)
Sun-Ki Chai, John Salerno, Patricia L. Mabry
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

Social computing is concerned with the study of social behavior and social context based on computational systems. Behavioral modeling provides a representation of the social behavior, and allows for experimenting, scenario planning, and deep und- standing of behavior, patterns, and potential outcomes. The pervasive use of computer and Internet technologies by humans in everyday life provides an unprecedented en- ronment of various social activities that, due to the platforms under which they take place, generate large amounts of stored data as a by-product, often in systematically organized form. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepe- ent systems are created and used to represent the various social and physical systems for investigating the interactions between groups, communities, or nation-states. This requires joint efforts to take advantage of the state-of-the-art research from multiple disciplines improving social computing and behavioral modeling in order to document lessons learned and develop novel theories, experiments, and methodologies to better explain the interaction between social (both informal and institutionalized), psyc- logical, and physical mechanisms. The goal is to enable us to experiment, create, and recreate an operational environment with a better understanding of the contributions from each individual discipline, forging joint interdisciplinary efforts. This volume comprises the proceedings of the third international workshop on - cial Computing, Behavioral Modeling and Prediction, which has grown trem- dously.

Biosurveillance and Biosecurity - International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings... Biosurveillance and Biosecurity - International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings (Paperback, 2008 ed.)
Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The 2008 Biosurveillance and Biosecurity Workshop (BioSecure 2008) was built on the success of the two U. S. National Science Foundation-sponsored Biosurveillance Workshops. The inaugural 2006 workshop was hosted by the University of Arizona's NSF BioPortal Center. It attracted more than 35 participants from academic insti- tions, industry, and public health agencies, and achieved its objective of bringing together infectious disease informatics (IDI) researchers and practitioners to discuss selected topics directly relevant to data sharing and analysis for real-time animal and public health surveillance. The 2007 meeting was held in New Brunswick, New J- sey, co-located with the 2007 IEEE International Conference on Intelligence and - curity Informatics, and met with tremendous success. Researchers from a wide range of backgrounds, including biosecurity, epidemiology, statistics, applied mathematics, information systems, computer science and machine learning/data mining, contributed formal papers to the workshop and actively participated in the meeting along with practitioners from both government agencies and industry. More than 65 people - tended the one-day workshop, representing major research labs across multiple dis- plines, key industry players, and a range of government entities. BioSecure 2008 continued this workshop series aiming to achieve the following objectives: (a) review and examine various informatics approaches for health surve- lance and biosecurity from both technological and policy perspectives; and (b) discuss and compare various systems approaches and algorithms of relevance to biosurve- lance and biosecurity.

Critical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October... Critical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 (Paperback, 2008 ed.)
Bernhard Hammerli
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3-5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department. In response to the 2007 call for papers, 75 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and critical infrastructures relevance of the work reported therein. At the end of the reviewing process, only 29 papers were selected for pres- tation. Revisions were not checked and the authors bear full responsibility for the content of their papers. CRITIS 2007 was very fortunate to have four exceptional invited speakers: Adrian Gheorghe (Old Dominion University, USA), Paulo Verissimo (Universidade de L- boa, Portugal), Donald Dudenhoeffer (Idaho National Labs, USA), and Jacques Bus (European Commission, INFSO Unit "Security"). The four provided a high added value to the quality of the conference with very significant talks on different and int- esting aspects of Critical Information Infrastructures. In 2007, CRITIS demonstrated its outstanding quality in this research area by - cluding ITCIP, which definitively reinforced the workshop. Additionally, the solid involvement of the IEEE community on CIP was a key factor for the success of the event. Moreover, CRITIS received sponsorship from Telecom Italia, JRC of the European Commission, IRRIIS, IFIP, and IABG, to whom we are greatly indebted."

Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October... Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers (Paperback, Edition.)
Sanjay Goel
R1,378 Discovery Miles 13 780 Ships in 18 - 22 working days

The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.

Human-Computer Etiquette - Cultural Expectations and the Design Implications They Place on Computers and Technology (Hardcover,... Human-Computer Etiquette - Cultural Expectations and the Design Implications They Place on Computers and Technology (Hardcover, New)
Caroline C. Hayes, Christopher A. Miller
R4,239 Discovery Miles 42 390 Ships in 10 - 15 working days

Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in technology adoption and how to design human-computer interfaces for a competitive global market.

Bridging The Digital Divide: Technology, Community And Public Policy (Paperback): Servon Bridging The Digital Divide: Technology, Community And Public Policy (Paperback)
Servon
R1,186 Discovery Miles 11 860 Ships in 10 - 15 working days

"Bridging the Digital Divide" investigates problems of unequal access to information technology. The author redefines this problem, examines its severity, and lays out what the future implications might be if the digital divide continues to exist. This is also the first book to assess empirically the policies in the United States designed to address the social problems arising from the digital divide. It analyzes policies at both federal and local level, as well as looking at the success of community-based initiatives. The analysis is supported by empirical data resulting from extensive fieldwork in several US cities. The book concludes with the author's recommendations for future public policy on the digital divide.

Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers... Information Hiding - 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers (Paperback, 2008 ed.)
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applications. We received a total of 64 papers from all over the globe, and would like to take this opportunity to thank all the authors who submitted their paper to IH 2008 and thus contributed to the consolidation of the reputation of the conference. The papers were refereed by at least three revi- ers who provided detailed comments, which was followed by discussion amongst the Program Committee members. Only 25 papers were selected for presentation. This rigorous review process will certainly strengthen Information Hiding's po- tion as the top forum of our community.

Forensics in Telecommunications, Information and Multimedia - Second International Conference, e-Forensics 2009, Adelaide,... Forensics in Telecommunications, Information and Multimedia - Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Matthew Sorell
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These - clude the impact of solid-state memory, ultra-portable devices, and distributed storage - also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O'Malley, Que- sland Police Service, who outlined the paperless case file system now in use in Que- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect's home before the suspect! Joseph Razik, represe- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nati- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation.

Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Zagreb, Croatia,... Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III (Paperback, 2008 ed.)
Ignac Lovrek
R2,804 Discovery Miles 28 040 Ships in 18 - 22 working days

The three volume set LNAI 5177, LNAI 5178, and LNAI 5179, constitutes the refereed proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008, held in Zagreb, Croatia, in September 2008.

The 316 revised papers presented were carefully reviewed and selected. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the third volume are intelligent data processing in process systems and plants; neural information processing for data mining; soft computing approach to management engineering; advanced groupware; agent and multi-agent systems: technologies and applications; engineered applications of semantic Web; evolvable hardware and adaptive systems; evolvable hardware applications in the area of electronic circuits design; hyperspectral imagery for remote sensing; immunity-based systems; innovations in intelligent multimedia systems and virtual reality; intelligent environment support for collaborative learning; intelligent systems in medicine and healthcare; knowledge interaction for creative learning; novel foundation and applications of intelligent systems; skill acquisition and ubiquitous human computer interaction; smart sustainability; unsupervised clustering for exploratory data anlysis; and use of AI techniques to build enterprise systems.

Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS... Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conv- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop.

Big Data, Surveillance and Crisis Management (Paperback): Kees Boersma, Chiara Fonio Big Data, Surveillance and Crisis Management (Paperback)
Kees Boersma, Chiara Fonio
R1,356 Discovery Miles 13 560 Ships in 10 - 15 working days

Big data, surveillance, crisis management. Three largely different and richly researched fields, however, the interplay amongst these three domains is rarely addressed. In this enlightening title, the link between these three fields is explored in a consequential order through a variety of contributions and series of unique and international case studies. Indeed, whilst considering crisis management as an "umbrella term" that covers a number of crises and ways of managing them, the reader will also explore the collection of "big data" by governmental crisis organisations. However, this volume also addresses the unintended consequences of using such data. In particular, through the lens of surveillance, one will also investigate how the use and abuse of big data can easily lead to monitoring and controlling the behaviour of people affected by crises. Thus, the reader will ultimately join the authors in their debate of how big data in crisis management needs to be examined as a political process involving questions of power and transparency. An enlightening and highly topical volume, Big Data, Surveillance and Crisis Management will appeal to postgraduate students and postdoctoral researchers interested in fields including Sociology and Surveillance Studies, Disaster and Crisis Management, Media Studies, Governmentality, Organisation Theory and Information Society Studies.

Financial Cryptography and Data Security - 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008.... Financial Cryptography and Data Security - 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers (Paperback, 2008 ed.)
Gene Tsudik
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier ?nancialand data security forum. The ProgramCommittee, led by the PCChair Gene Tsudik, achievedan excellent program balance between research, practice, and panel sessions. This year the program included two new additions, namely, a short-paper track and a poster session, both extremely well received. Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadeloupe, Bermuda, and the Grand Cayman. In 2008 we continued this t- dition and the conference was located in sunny Cozumel, Mexico. The ongoing carnival, sailing, submarine trips, and Mayan ruins were just a few of the - merous exciteme

Visioning and Engineering the Knowledge Society - A Web Science Perspective - Second World Summit on the Knowledge Society,... Visioning and Engineering the Knowledge Society - A Web Science Perspective - Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings (Paperback, 2009 ed.)
Miltiadis D Lytras, Ernesto Damiani, John M Carroll, Robert D. Tennyson, David Avison, …
R2,745 Discovery Miles 27 450 Ships in 18 - 22 working days

It is a great pleasure to share with you the Springer LNCS proceedings of the Second World Summit on the Knowledge Society, WSKS 2009, organized by the Open - search Society, Ngo, http: //www.open-knowledge-society.org, and held in Samaria Hotel, in the beautiful city of Chania in Crete, Greece, September 16-18, 2009. The 2nd World Summit on the Knowledge Society (WSKS 2009) was an inter- tional scientific event devoted to promoting dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple of years has brought to the fore the need to discuss in depth new policies and strategies for a human centric developmental processes in the global context. This annual summit brings together key stakeholders involved in the worldwide development of the knowledge society, from academia, industry, and government, including policy makers and active citizens, to look at the impact and prospects of - formation technology, and the knowledge-based era it is creating, on key facets of l- ing, working, learning, innovating, and collaborating in today's hyper-complex world. The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research on new scientific ideas relevant to - ternational research agendas such as the EU (FP7), OECD, or UNESCO. We focus on the key aspects of a new sustainable deal for a bold response to the multidimensional crisis of our times.

Transactions on Data Hiding and Multimedia Security IV (Paperback, 2009 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security IV (Paperback, 2009 ed.)
Yun Q. Shi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.

Learning in the Synergy of Multiple Disciplines - 4th European Conference on Technology Enhanced Learning, EC-TEL 2009 Nice,... Learning in the Synergy of Multiple Disciplines - 4th European Conference on Technology Enhanced Learning, EC-TEL 2009 Nice, France, September 29--October 2, 2009 Proceedings (Paperback, 2009 ed.)
Ulrike Cress, Vania Dimitrova, Marcus Specht
R2,795 Discovery Miles 27 950 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Conference on Technology Enhanced Learning, EC-TEL 2009, held in Nice, France in September/October 2009.

The 35 revised full papers, 17 short papers, and 35 posters presented were carefully reviewed and selected from 136 paper submissions and 22 poster submissions. The papers are organized in topical sections on adaptation and personalization, interoperability, semantic Web, Web 2.0., data mining and social networks, collaboration and social knowledge construction, learning communities and communities of practice, learning contexts, problem and project-based learning, inquiry, learning, learning design, motivation, engagement, learning games, and human factors and evaluation.

Recent Advances in Intrusion Detection - 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009,... Recent Advances in Intrusion Detection - 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings (Paperback, 2009 ed.)
Engin Kirda, Somesh Jha, Davide Balzarotti
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23-25. As in the past, the symposium brought together leading - searchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were six main sessions prese- ingfullresearchpapersonanomalyandspeci?cation-basedapproaches,malware detection and prevention, network and host intrusion detection and prevention, intrusion detection for mobile devices, and high-performance intrusion det- tion. Furthermore, there was a poster session on emerging research areas and case studies. The RAID 2009ProgramCommittee received59 full paper submissionsfrom all over the world. All submissions were carefully reviewed by independent - viewers on the basis of space, topic, technical assessment, and overall balance. The ?nal selection took place at the Program Committee meeting on May 21 in Oakland, California. In all, 17 papers were selected for presentation and p- lication in the conference proceedings. As a continued feature, the symposium accepted submissions for poster presentations which have been published as - tended abstracts, reporting early-stage research, demonstration of applications, or case studies. Thirty posters were submitted for a numerical review by an independent, three-person sub-committee of the Program Committee based on novelty, description, and evaluation. The sub-committee recommended the - ceptance of 16 of these posters for presentation and publication. The success of RAID 2009 depended on the joint e?ort of many people.

Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Zagreb, Croatia,... Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I (Paperback, 2008 ed.)
Ignac Lovrek
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

The three volume set LNAI 5177, LNAI 5178, and LNAI 5179, constitutes the refereed proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008, held in Zagreb, Croatia, in September 2008.

The 316 revised papers presented were carefully reviewed and selected. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the first volume are artificial neural networks and connectionists systems; fuzzy and neuro-fuzzy systems; evolutionary computation; machine learning and classical AI; agent systems; knowledge based and expert systems; intelligent vision and image processing; knowledge management, ontologies, and data mining; Web intelligence, text and multimedia mining and retrieval; and intelligent robotics and control.

Agents and Peer-to-Peer Computing - 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited... Agents and Peer-to-Peer Computing - 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers (Paperback, 2008 ed.)
Sam Joseph, Zoran Despotovic, Moro Gianluca, Sonia Bergamaschi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2006, held in Hakodate, Japan, in May 2006, in the context of the 5th International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2006.

The 10 revised full papers and 6 revised short papers presented together with 1 invited paper were carefully reviewed and selected from 23 submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on P2P Infrastructure, agents in P2P, P2P search, and applications.

Intelligent Virtual Agents - 9th International Conference, IVA 2009 Amsterdam, The Netherlands, September 14-16, 2009... Intelligent Virtual Agents - 9th International Conference, IVA 2009 Amsterdam, The Netherlands, September 14-16, 2009 Proceedings (Paperback, 2009 ed.)
Zsofia Ruttkay, Michael Kipp, Anton Nijholt, Hannes Hoegni Vilhjalmsson
R2,733 Discovery Miles 27 330 Ships in 18 - 22 working days

Welcome to the proceedings of the 9th International Conference on Intelligent Virtual Agents, held September 14-16, 2009 in Amsterdam, The Netherlands. Intelligent virtual agents (IVAs) are interactive characters that exhibit hum- like qualities and communicate with humans or with each other using natural human modalities such as speech and gesture. They are capable of real-time perception, cognition and action, allowing them to participate in a dynamic physical and social environment. IVA is an interdisciplinary annual conference and the main forum for p- senting research on modeling, developing and evaluating IVAs with a focus on communicative abilities and social behavior. The development of IVAs requires expertise in multimodal interaction and several AI ?elds such as cognitive m- eling, planning, vision and natural language processing. Computational models are typically based on experimental studies and theories of human-human and human-robot interaction; conversely, IVA technology may provide interesting lessons for these ?elds. The realization of engaging IVAs is a challenging task, so reusable modules and tools are of great value. The ?elds of application range from robot assistants, social simulation and tutoring to games and artistic - ploration.

Advances in Artificial Intelligence - 22nd Canadian Conference on Artificial Intelligence, Canadian AI 2009, Kelowna, Canada,... Advances in Artificial Intelligence - 22nd Canadian Conference on Artificial Intelligence, Canadian AI 2009, Kelowna, Canada, May 25-27, 2009 Proceedings (Paperback, 2009 ed.)
Yong Gao, Nathalie Japkowicz
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 22nd Conference on Artificial Intelligence, Canadian AI 2009, held in Kelowna, Canada, in May 2009.

The 15 revised full papers presented together with 19 revised short papers, 8 papers from the graduate student symposium and the abstracts of 3 keynote presentations were carefully reviewed and selected from 63 submissions. The papers present original high-quality research in all areas of Artificial Intelligence and apply historical AI techniques to modern problem domains as well as recent techniques to historical problem settings.

Advances in Ubiquitous User Modelling - Revised Selected Papers (Paperback, 2009 ed.): Tsvi Kuflik, Shlomo Berkovsky, Francesca... Advances in Ubiquitous User Modelling - Revised Selected Papers (Paperback, 2009 ed.)
Tsvi Kuflik, Shlomo Berkovsky, Francesca Carmagnola, Dominikus Heckmann, Antonio Kruger
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days

Ubiquitous user modeling differs from generic user modeling by three additional concepts: ongoing modeling, ongoing sharing, and ongoing exploitation. Systems that share their user models will improve the coverage, the level of detail, and the reliability of the integrated user models and thus allow better functions of adaptation. Ubiquitous user modeling implies new challenges of interchangeability, scalability, scrutability, and privacy.

This volume presents results of a series of workshops on the topic of Ubiquitous User Modeling since 2003 and additional workshops at various other conferences e.g. on User Modeling and Adaptive Hypermedia in the last four years.

The 8 revised full papers presented were carefully reviewed and selected from the best lectures given at the workshops and were significantly extended to be included in the book.

E-Voting and Identity - Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings (Paperback,... E-Voting and Identity - Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings (Paperback, 2009 ed.)
Peter Y. A. Ryan, Berry Schoenmakers
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

These proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL- embourgduring September 7-8,2009, hostedbythe Universityof Luxembourg. VoteID 2009 built on the success of the 2007 edition held in Bochum. Events have moved on dramatically in the intervening two years: at the time of writing, people are in the streets of Tehran protesting against the claimed outcome of the June12thpresidentialelectionin Iran.Banners bearingthe words"Whereis my vote?" bear testimony to the strength of feeling and the need for elections to be trusted. These events show that the search for high-assurance voting is not a purely academic pursuit but one of very real importance. We hope that VoteID 2009 will help contribute to our understanding of the foundations of democracy. TheProgramCommitteeselected11papersforpresentationattheconference out of a total of 24 submissions. Each submission was reviewed by at least four Program Committee members. The EasyChair conference management system proved instrumental in the reviewing process as well as in the preparation of these proceedings. The selected papers cover a wide range of aspects of voting: proposals for high-assurancevotingsystems, evaluationofexistingsystems, assessmentofp- lic response to electronic voting and legal aspects. The program also included a keynote by Mark Ryan.

Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008,... Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings (Paperback, 2008 ed.)
Stig F. Mjolsnes, Sjouke Mauw, Sokratis Katsikas
R1,397 Discovery Miles 13 970 Ships in 18 - 22 working days

This book contains the proceedings of the 5th European Public Key Infrastr- ture Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gloshaugen in Trondheim, Norway, in June 2008. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Simplyput, publickeysareeasiertodistributethansecretkeys.Nevertheless, constructing e?ective, practical, secure and low cost means for assuring auth- ticity and validity of public keys used in large-scale networked services remains both a technological and organizational challenge. In a nutshell, this is the PKI problem, and the papers presented herein propose new solutions and insight for these questions. This volume holds 16 refereedpapers including the presentationpaper by the invited speaker P. Landrock. In response to the EuroPKI 2008 call for papers, a total of 37 paper proposalswere received. All submissions underwenta thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries: Belgium, Brazil, Canada, Finland, Germany, Japan, Malaysia, Norway, Spain, and the USA.Theacceptedpaperswereorganizedintothe topicalsessions: InvitedTalk, Certi?cates, Authentication, Practice, Signatures, Analysis, and Networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach Hardcover R9,337 Discovery Miles 93 370
Artificial Intelligence - An Essential…
Neil Wilkins Hardcover R662 R591 Discovery Miles 5 910
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R3,245 Discovery Miles 32 450
The Alignment Problem - Machine Learning…
Brian Christian Paperback R598 R370 Discovery Miles 3 700
Autonomous Vehicles - Tracing the Locus…
Atilla Kasap Hardcover R3,042 Discovery Miles 30 420
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R505 Discovery Miles 5 050
Handbook of Research on Cultural and…
P.E. Thomas, M. Srihari, … Hardcover R7,997 Discovery Miles 79 970
Misbelief - What Makes Rational People…
Dan Ariely Paperback R350 R317 Discovery Miles 3 170
P5 EHealth - An Agenda for the Health…
Gabriella Pravettoni, Stefano Triberti Hardcover R1,300 Discovery Miles 13 000
The Citizen Marketer
Joel Penney Hardcover R3,274 Discovery Miles 32 740

 

Partners