0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (23)
  • R250 - R500 (182)
  • R500+ (2,686)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Security and Protection in Information Processing Systems - IFIP 18th World Computer Congress TC11 19th International... Security and Protection in Information Processing Systems - IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France (Paperback, Softcover reprint of the original 1st ed. 2004)
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.

Pervasive Computing - 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings (Paperback,... Pervasive Computing - 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings (Paperback, 2012 ed.)
Judy Kay, Paul Lukowicz, Hideyuki Tokuda, Patrick Olivier, Antonio Kruger
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012. The 28 revised papers presented were carefully reviewed and selected from 138 submissions. The contributions are grouped into the following topical sections: activity capturing; urban mobility and computing; home and energy; HCI; development tools and devices; indoor location and positioning; social computing and games; privacy; public displays and services.

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems -... Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings (Paperback, 2012 ed.)
Ioannis Askoxylakis, Henrich C. Poehls, Joachim Posegga
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.

Haptic and Audio Interaction Design - 7th International Conference, HAID 2012, Lund, Sweden, August 23-24, 2012, Proceedings... Haptic and Audio Interaction Design - 7th International Conference, HAID 2012, Lund, Sweden, August 23-24, 2012, Proceedings (Paperback, 2012 ed.)
Charlotte Magnusson, Delphine Szymczak, Stephen Brewster
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Haptic and Audio Interaction Design, HAID 2012, held in Lund, Sweden, in August 2012. The 15 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on haptics and audio in navigation, supporting experiences and activities, object and interface, test and evaluation.

Business Process Management - 10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012, Proceedings... Business Process Management - 10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012, Proceedings (Paperback, 2012 ed.)
Alistair Barros, Avigdor Gal, Ekkart Kindler
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012. The 17 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 126 submissions. The book also features two keynote lectures which were given at the conference. The papers are organized in topical sections named: process quality; conformance and compliance; BPM applications; process model analysis; BPM and the cloud; requirements and performance; process mining; and refactoring and optimization.

Computers Helping People with Special Needs - 13th International Conference, ICCHP 2012, Linz, Austria, July 11-13, 2012,... Computers Helping People with Special Needs - 13th International Conference, ICCHP 2012, Linz, Austria, July 11-13, 2012, Proceedings, Part II (Paperback, 2012 ed.)
Klaus Miesenberger, Arthur Karshmer, Petr Penaz, Wolfgang Zagler
R1,645 Discovery Miles 16 450 Ships in 10 - 15 working days

The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012. The 147 revised full papers and 42 short papers were carefully reviewed and selected from 364 submissions. The papers included in the second volume are organized in the following topical sections: portable and mobile systems in assistive technology; assistive technology, HCI and rehabilitation; sign 2.0: ICT for sign language users: information sharing, interoperability, user-centered design and collaboration; computer-assisted augmentative and alternative communication; easy to Web between science of education, information design and speech technology; smart and assistive environments: ambient assisted living; text entry for accessible computing; tactile graphics and models for blind people and recognition of shapes by touch; mobility for blind and partially sighted people; and human-computer interaction for blind and partially sighted people.

Transactions on Computational Science XVI (Paperback, 2012 ed.): Marina Gavrilova, C.J. Kenneth Tan Transactions on Computational Science XVI (Paperback, 2012 ed.)
Marina Gavrilova, C.J. Kenneth Tan
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 16th issue of the Transactions on Computational Science journal contains 11 extended versions of selected papers from Cyberworlds 2011, held in Banff, AB, Canada, in October 2011. The topics span the areas of haptic modeling, shared virtual worlds, virtual reality, human-computer interfaces, e-learning in virtual collaborative spaces, multi-user web games, cybersecurity, social networking, and art and heritage in cyberspaces.

Online Child Sexual Abuse - Grooming, Policing and Child Protection in a Multi-Media World (Paperback): Elena Martellozzo Online Child Sexual Abuse - Grooming, Policing and Child Protection in a Multi-Media World (Paperback)
Elena Martellozzo
R1,660 Discovery Miles 16 600 Ships in 12 - 19 working days

Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world. Online child sexual abuse has become a high profile and important issue in public life. When children are victims, there is clearly intense public and political interest and concern. Sex offenders are society's most reviled deviants and the object of seemingly undifferentiated public fear and loathing. This may be evidenced in ongoing efforts to advance legislation, develop police tactics and to educate children and their carers to engage with multi-media and the internet safely. Understanding how sex offenders use the internet and how the police and the government are responding to their behaviour is central to the development of preventative measures. Based on extensive ethnographic research conducted with the police and a specialist paedophile unit, here Elena Marellozzo presents an informed analysis of online child sexual abuse: of the patterns and characteristics of online grooming, and of the challenges and techniques that characterize its policing. Connecting theory, research and practice in the field of policing, social policy, victimology and criminology, this book adds significantly to our understanding and knowledge of the problem of online child sexual abuse, the way in which victims are targeted and how this phenomenon is, and might be, policed.

Product-Focused Software Process Improvement - 13th International Conference, PROFES 2012, Madrid, Spain, June 13-15, 2012,... Product-Focused Software Process Improvement - 13th International Conference, PROFES 2012, Madrid, Spain, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Oscar Dieste, Andreas Jedlitschka, Natalia Juristo
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012. The 21 revised full papers presented together with 3 short papers and 4 workshop and tutorial papers were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on process focused software process improvement, open-source agile and lean practices, product and process measurements and estimation, distributed and global software development, quality assessment, and empirical studies.

Persuasive Technology: Design for Health and Safety - 7th International Conference on Persuasive Technology, PERSUASIVE 2012,... Persuasive Technology: Design for Health and Safety - 7th International Conference on Persuasive Technology, PERSUASIVE 2012, Linkoeping, Sweden, June 6-8, 2012. Proceedings (Paperback, 2012 ed.)
Magnus Bang, Eva L. Ragnemalm
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."

IT Revolutions - Third International ICST Conference, Cordoba, Spain, March 23-25, 2011, Revised Selected Papers (Paperback,... IT Revolutions - Third International ICST Conference, Cordoba, Spain, March 23-25, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Matias Linan Reyes, Jose M. Flores Arias, Juan J Gonzalez De LA Rosa, Josef Langer, Francisco J. Bellido Outeirino, …
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 3 rd International ICST Conference on IT Revolutions, held in Cordoba, Spain in March 2011. The 20 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in topical sections on eGreen energy, smart buildings, health and ambient assisted living, smart environments and user experience, grid and cloud computing, eLearning.

Ethical and Social Issues in the Information Age (Paperback, Softcover reprint of hardcover 4th ed. 2010): Joseph Migga Kizza Ethical and Social Issues in the Information Age (Paperback, Softcover reprint of hardcover 4th ed. 2010)
Joseph Migga Kizza
R1,784 Discovery Miles 17 840 Ships in 10 - 15 working days

The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.

Diagrammatic Representation and Inference - 7th International Conference, Diagrams 2012, Canterbury, UK, July 2-6, 2012,... Diagrammatic Representation and Inference - 7th International Conference, Diagrams 2012, Canterbury, UK, July 2-6, 2012, Proceedings (Paperback)
Philip T. Cox, Beryl Plimmer, Peter Rodgers
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012. The 16 long papers, 6 short papers and 21 poster abstracts presented were carefully reviewed and selected from 83 submissions. The papers are organized in keynotes, tutorial, workshops, graduate student symposium and topical sections on psychological and cognitive issues, diagram layout, diagrams and data analysis, Venn and Euler diagrams, reasoning with diagrams, investigating aesthetics, applications of diagrams.

The Practical Handbook of Computerization for Distribution Managers (Paperback, Softcover reprint of the original 1st ed.... The Practical Handbook of Computerization for Distribution Managers (Paperback, Softcover reprint of the original 1st ed. 1987)
Colin Barrett
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days

Back in 1983 I was chatting with Dick Coleman, publisher of Traffic World magazine, when he unexpectedly proposed that I write a column for the magazine on computer applications in the transportation/physical distribution industry. "But, Dick, I don't know all that much about computers," I protested. "You use one, don't you?" he asked logically. Yes, I did; I'd been running my consulting business with it for two years. But that didn't, I explained, make me an expert. "Think about it," he said. That's typical Coleman; he drops these studiedly casual ideas and just lets them lay there until you pick them up and wind up doing just what he wanted you to do all along. Sure enough, the longer I pondered the notion the more it appealed to me. OK, I wasn't a computer expert (I'm still not). But I was a computer user, in the transportation/distribution field; maybe from that perspective I might have some useful things to say to other transportation/distribution users and would-be users of computers. Thus was born the "Computer Software for Transportation" column. The first one appeared in the April 11, 1983, issue of Traffic World, and it's been a once-a-month schedule ever since. And thus, too, was ultimately born this book.

Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings... Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, …
R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Multimodal Pattern Recognition of Social Signals in Human-Computer-Interaction - First IAPR TC3 Workshop, MPRSS 2012, Tsukuba,... Multimodal Pattern Recognition of Social Signals in Human-Computer-Interaction - First IAPR TC3 Workshop, MPRSS 2012, Tsukuba, Japan, November 11, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Friedhelm Schwenker, Stefan Scherer, Louis-Philippe Morency
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the First IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction (MPRSS2012), held in Tsukuba, Japan in November 2012, in collaboration with the NLGD Festival of Games. The 21 revised papers presented during the workshop cover topics on facial expression recognition, audiovisual emotion recognition, multimodal Information fusion architectures, learning from unlabeled and partially labeled data, learning of time series, companion technologies and robotics.

Electronic Healthcare - 4th International Conference, eHealth 2011, Malaga, Spain, November 21-23, 2011, Revised Selected... Electronic Healthcare - 4th International Conference, eHealth 2011, Malaga, Spain, November 21-23, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Patty Kostkova, Martin Szomszor, David Fowler
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011. The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration.

Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on... Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings (Paperback, 2012)
Pierpaolo Degano, Joshua D. Guttman
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

History of Nordic Computing 2 - Second IFIP WG 9.7 Conference, HiNC 2, Turku, Finland, August 21-23, 2007, Revised Selected... History of Nordic Computing 2 - Second IFIP WG 9.7 Conference, HiNC 2, Turku, Finland, August 21-23, 2007, Revised Selected Papers (Paperback, 2009 ed.)
John Impagliazzo, Timo Jarvi, Petri Paju
R2,887 Discovery Miles 28 870 Ships in 10 - 15 working days

The First Conference on the History of Nordic Computing (HiNC1) was organized in Trondheim, in June 2003. The HiNC1 event focused on the early years of computing, that is the years from the 1940s through the 1960s, although it formally extended to year 1985. In the preface of the proceedings of HiNC1, Janis Bubenko, Jr. , John Impagliazzo, and Arne Solvberg describe well the peculiarities of early Nordic c- puting [1]. While developing hardware was a necessity for the first professionals, quite soon the computer became an industrial product. Computer scientists, among others, grew increasingly interested in programming and application software. P- gress in these areas from the 1960s to the 1980s was experienced as astonishing. The developments during these decades were taken as the focus of HiNC2. During those decades computers arrived to every branch of large and medium-sized businesses and the users of the computer systems were no longer only computer s- cialists but also people with other main duties. Compared to the early years of comp- ing before 1960, where the number of computer projects and applications was small, capturing a holistic view of the history between the 1960s and the 1980s is conside- bly more difficult. The HiNC2 conference attempted to help in this endeavor.

Advances in User Modeling - UMAP 2011 Workshops, Girona, Spain, July 11-15, 2011, Revised Selected Papers (Paperback, 2012):... Advances in User Modeling - UMAP 2011 Workshops, Girona, Spain, July 11-15, 2011, Revised Selected Papers (Paperback, 2012)
Liliana Ardissono, Tsvi Kuflik
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011. The 40 papers presented were carefully reviewed and selected for inclusion in this book. For each workshop there is an overview paper summarizing the workshop themes, the accepted contributions and the future research trends. In addition the volume presents a selection of the best poster papers of UMAP 2011. The workshops included are: AST, adaptive support for team collaboration; AUM, augmenting user models with real worlds experiences to enhance personalization and adaptation; DEMRA, decision making and recommendation acceptance issues in recommender systems; PALE, personalization approaches in learning environments; SASWeb, semantic adaptive social web; TRUM, trust, reputation and user modeling; UMADR, user modeling and adaptation for daily routines: providing assistance to people with special and specific needs; UMMS, user models for motivational systems: the affective and the rational routes to persuasion.

Theory and Applications of Formal Argumentation - First International Workshop, TAFA 2011. Barcelona, Spain, July 16-17, 2011,... Theory and Applications of Formal Argumentation - First International Workshop, TAFA 2011. Barcelona, Spain, July 16-17, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Sanjay Modgil, Nir Oren, Francesca Toni
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the First International Workshop on the Theory and Applications of Formal Argumentation, TAFA 2011, held in Barcelona, Spain, in Juli 2011, as a workshop at IJCAI 2011, the 22nd International Joint Conference on Artificial Intelligence. The 9 revised full papers presented together with 8 revised poster papers were carefully selected during two rounds of reviewing and improvement from 32 initial submissions. The workshop promotes and fosters uptake of argumentation as a viable AI paradigm with wide ranging application, and provides a forum for further development of ideas and the initiation of new and innovative collaborations. The papers cover the following topics: properties of formal models of argumentation; instantiations of abstract argumentation frameworks; relationships among different argumentation frameworks; practical applications of formal models of argumentation; argumentation and other artificial intelligence techniques; evaluation of formal models of argumentation; validation and evaluation of applications of argumentation.

Marketing en Instagram - Como dominar su nicho en 2019 promocionando su pequena empresa y marca personal en una red social... Marketing en Instagram - Como dominar su nicho en 2019 promocionando su pequena empresa y marca personal en una red social super popular y aprovechar a sus influencers (Spanish Edition) (Spanish, Hardcover)
Matt Golden
R718 R634 Discovery Miles 6 340 Save R84 (12%) Ships in 10 - 15 working days
Open Source Ecosystems: Diverse Communities Interacting - 5th IFIP WG 2.13 International Conference on Open Source Systems, OSS... Open Source Ecosystems: Diverse Communities Interacting - 5th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2009, Skoevde, Sweden, June 3-6, 2009, Proceedings (Paperback, 2009 ed.)
Cornelia Boldyreff, Kevin Crowston, Bjoern Lundell, Anthony I Wasserman
R2,896 Discovery Miles 28 960 Ships in 10 - 15 working days

Welcome to the 5th International Conference on Open Source Systems! It is quite an achievement to reach the five-year mark - that's the sign of a successful enterprise. This annual conference is now being recognized as the primary event for the open source research community, attracting not only high-quality papers, but also building a community around a technical program, a collection of workshops, and (starting this year) a Doctoral Consortium. Reaching this milestone reflects the efforts of many people, including the conference founders, as well as the organizers and participants in the previous conferences. My task has been easy, and has been greatly aided by the hard work of Kevin Crowston and Cornelia Boldyreff, the Program Committee, as well as the Organizing Team led by Bjoern Lundell. All of us are also grateful to our attendees, especially in the difficult economic climate of 2009. We hope the participants found the conference valuable both for its technical content and for its personal networking opportunities. To me, it is interesting to look back over the past five years, not just at this conference, but at the development and acceptance of open source software. Since 2004, the business and commercial side of open source has grown enormously. At that time, there were only a handful of open source businesses, led by RedHat and its Linux distribution. Companies such as MySQL and JBoss were still quite small.

Green Communication and Networking - First International Conference, GreeNets 2011, Colmar, France, October 5-7, 2011, Revised... Green Communication and Networking - First International Conference, GreeNets 2011, Colmar, France, October 5-7, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Joel Jose P C Rodrigues, Liang Zhou, Min Chen, Aravind Kailas
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Green Communication and Networking (GreeNets 2011), held in Colmar, France, on October 5-7, 2011. The 16 revised full papers presented were carefully selected and reviewed from numerous submissions and explain the scope and challenges of designing, building, and deploying GreeNets. In this regard, the conference aims to establish a forum to bring together research professionals from diverse fields including green mobile networks, system architectures, networking & communication protocols, applications, test-bed and prototype, traffic balance and energy-efficient cooperation transmission, system and application issues related to GreenNets.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kanban - How to Visualize Work and…
Greg Caldwell Hardcover R659 R586 Discovery Miles 5 860
Transactions of the Royal Society of…
Royal Society of South Australia Paperback R943 Discovery Miles 9 430
Descriptive Catalogue of the Reptiles of…
William Theobald Paperback R563 Discovery Miles 5 630
The Game Birds of California
Joseph Grinnell Paperback R827 Discovery Miles 8 270
The Fleas of North America…
Henry Ellsworth Ewing Paperback R443 Discovery Miles 4 430
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R971 R833 Discovery Miles 8 330
The Student's Compendium of Comparative…
P Evers Paperback R402 Discovery Miles 4 020
Web-Based Services - Concepts…
Information Reso Management Association Hardcover R18,334 Discovery Miles 183 340
Zulu Bird Names And Bird Lore
Adrian Koopman Paperback R560 R511 Discovery Miles 5 110
Aws - The Most Complete Guide to Amazon…
Aiden Phillips Hardcover R808 R707 Discovery Miles 7 070

 

Partners