0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (23)
  • R250 - R500 (177)
  • R500+ (2,652)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October... Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers (Paperback, Edition.)
Sanjay Goel
R1,378 Discovery Miles 13 780 Ships in 18 - 22 working days

The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.

Fun and Games - Second International Conference, Eindhoven, The Netherlands, October 20-21, 2008, Proceedings (Paperback, 2008... Fun and Games - Second International Conference, Eindhoven, The Netherlands, October 20-21, 2008, Proceedings (Paperback, 2008 ed.)
Panos Markopoulos, Wijnand IJsselsteijn, Duncan Rowland
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The use of computing technology for entertainment purposes is not a recent p- nomenon. Video game consoles, home computers and other entertainment media have been used widely for more than three decades, and people of all ages are spe- ing an increasing amount of time and money on these technologies. More recent is the rise of a vibrant research community focusing on gaming and entertainment applications. Driven by the growth and the coming of age of the g- ing industry, and by its increasing recognition in the media and the minds of the broader public, the study of computer games, game development and experiences is attracting the interest of researchers from very diverse fields: social sciences, comp- ing, electrical engineering, design, etc. Research of this kind looks to extend the boundaries of gaming technologies. In a relentless drive for innovation, it looks to create and understand an ever increasing range of experiences, and examine how games can provide value for educational, therapeutic and other 'serious' purposes. These themes were reflected in the call for participation and eventually the papers accepted for presentation. The Fun n' Games conference was the second event of a bi-annual series of c- ferences. The first event of the series was held in Preston in 2006 organized by the University of Central Lancashire. Following the success of this event it was decided to run a follow up.

Smart Card Research and Advanced Applications - 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK,... Smart Card Research and Advanced Applications - 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings (Paperback, 2008 ed.)
Gilles Grimaud, Francois-Xavier Standaert
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's CARDIS was held in London, UK, on September 8-11, 2008. It was organized by the Smart Card Centre, Information Security Group of the Royal Holloway, University of London. Thepresentvolumecontainsthe21papersthatwereselectedfromthe51s- missions to the conference. The 22 members of the program committee worked hard in order to evaluate each submission with at least three reviews and agree on a high quality ?nal program. Additionally, 61 external reviewers helped the committee with their expertise. Two invited talks completed the technical p- gram. The ?rst one, given by Ram Banerjee and Anki Nelaturu, was entitled "Getting Started with Java Card 3.0 Platform." The second one, given by Aline Gouget, was about "Recent Advances in Electronic Cash Design" and was c- pleted by an abstract provided in these proceedings.

E-Commerce and Web Technologies - 9th International Conference, EC-Web 2008 Turin, Italy, September 3-4, 2008, Proceedings... E-Commerce and Web Technologies - 9th International Conference, EC-Web 2008 Turin, Italy, September 3-4, 2008, Proceedings (Paperback, 2008 ed.)
Giuseppe Psaila, Roland Wagner
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The International Conference on E-commerce and Web Technologies (EC-Web) is a mature and well-established forum for researchers working in the area of electronic commerce and web technologies. These are the proceedings of the ninth conference in the series, which, like previous EC-Web conferences, was co-located with DEXA, the International Conference on Database and Expert Systems Applications, which, this year, took place in Turin, Italy. One key feature of EC-Web is its two-fold nature: it brings together both papers proposing technological solutions for e-commerce and the World Wide Web, and papers concerning the management of e-commerce, such as web marketing, the impact of e-commerce on business processes and organizations, the analysis of case studies, as well as social aspects of e-commerce (to understand the impact of e-commerce solutions on day-to-day life and the new opportunities that these behaviors open). The technical program included 12 reviewed papers and two invited papers. Each paper was reviewed by five reviewers, in order to select only the best quality papers. The program included five sessions: "Security in E-Commerce" (with two papers), "Social Aspects of E-Commerce" (with two papers), "Business Process and EC Inf- structures" (with three papers), "Recommender Systems and E-Negotiations" (with four papers) and "Web Marketing and User Profiling" (with three papers). We found the program interesting and we hope participants and readers feel the same. Furthermore, we hope the attendees enjoyed the conference and Turin. June 2008 Giuseppe Psaila Roland R. Wagner

Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008,... Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008, Proceedings (Paperback, 2008 ed.)
James Bailey, David Maier, Klaus-Dieter Schewe, Bernhard Thalheim, X.Sean Wang
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

WISE 2008 was held in Auckland, New Zealand, during September 1-3, at The Auckland University ofTechnology City Campus Conference Centre. The aim of this conferencewasto providean internationalforum for researchers, professi- als, and industrial practitioners to share their knowledge in the rapidly growing area of Web technologies, methodologies, and applications. Previous WISE c- ferences wereheld in Hong Kong, China (2000), Kyoto, Japan (2001), Singapore (2002), Rome, Italy (2003), Brisbane, Australia (2004), New York, USA (2005), Wuhan, China (2006) and Nancy, France (2007). The call for papers created considerable interest. Around 110 paper s- missions were received and the international Program Committee selected 31 papers out of the 110 submissions (an acceptance rate of 28. 2%). Of these, 17 papers were chosen for standard presentation and the remaining 14 papers for short presentation. The authors of the accepted papers range across 13 co- tries: Australia, China, Germany, Greece, Italy, Japan, Korea, New Zealand, Poland, Singapore, Spain, Switzerland and the USA. The technical track of the WISE 2008 program o?ered nine paper presentation sessions. The selected - pers covered a wide and important variety of issues in Web information systems engineering such as querying; search; ranking; trust; peer-to-peer networks; - formation ?ltering; information integration; agents and mining. A few selected papers from WISE 2008 will be published in a special issue of the World Wide Web Journal, bySpringer. Inaddition, a $1000prizewasawardedto the authors ofthepaperselectedforthe"YahikoKambayashiBestPaperAward. "Wethank all authors who submitted their papers and the Program Committee members andexternalreviewersfor their excellent work.

Machine Learning for Multimodal Interaction - 5th International Workshop, MLMI 2008, Utrecht, The Netherlands, September 8-10,... Machine Learning for Multimodal Interaction - 5th International Workshop, MLMI 2008, Utrecht, The Netherlands, September 8-10, 2008, Proceedings (Paperback, 2008 ed.)
Andrei Popescu-Belis, Rainer Stiefelhagen
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days

TheseriesofworkshopsonMachineLearningforMultimodalInteraction(MLMI) celebratesthisyearits?fthanniversary.Onthisoccasion, anumberofinnovations havebeenintroducedin the reviewingandpublicationprocedures, while keeping the focus onthe samescienti?c topics. For the ?rst time, the reviewing process has been adapted in order to p- parethe proceedings in time for the workshop, held on September 8-10,2008, in Utrecht, The Netherlands. The 47 submissions received by the Program C- mittee were ?rst reviewed by three PC members each, and then advocated by an Area Chair. Overall, 12 oral presentations (ca. 25% of all submissions) and 15 poster presentations were selected. Authors were given one month to revise their papers according to the reviews, and the ?nal versions were brie?y checked by the two Program Co-chairs. Both types of presentation have been give equal space in the present proceedings. The 32 papers gathered in this volume cover a wide range of topics - lated to human-human communication modeling and processing, as well as to human-computer interaction, using several communication modalities. A sign- icant number of papers focus on the analysis of non-verbal communication cues, such as the expression of emotions, laughter, face turning, or gestures, which demonstrates a growing interest for social signal processing. Yet, another large set of papers targets the analysis of communicative content, with a focus on the abstractionofinformationfrommeetingsintheformofsummaries, actionitems, ordialogueacts.OthertopicspresentedatMLMI2008includeaudio-visualscene analysis, speech processing, interactive systems and applica

Visioning and Engineering the Knowledge Society - A Web Science Perspective - Second World Summit on the Knowledge Society,... Visioning and Engineering the Knowledge Society - A Web Science Perspective - Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings (Paperback, 2009 ed.)
Miltiadis D Lytras, Ernesto Damiani, John M Carroll, Robert D. Tennyson, David Avison, …
R2,745 Discovery Miles 27 450 Ships in 18 - 22 working days

It is a great pleasure to share with you the Springer LNCS proceedings of the Second World Summit on the Knowledge Society, WSKS 2009, organized by the Open - search Society, Ngo, http: //www.open-knowledge-society.org, and held in Samaria Hotel, in the beautiful city of Chania in Crete, Greece, September 16-18, 2009. The 2nd World Summit on the Knowledge Society (WSKS 2009) was an inter- tional scientific event devoted to promoting dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple of years has brought to the fore the need to discuss in depth new policies and strategies for a human centric developmental processes in the global context. This annual summit brings together key stakeholders involved in the worldwide development of the knowledge society, from academia, industry, and government, including policy makers and active citizens, to look at the impact and prospects of - formation technology, and the knowledge-based era it is creating, on key facets of l- ing, working, learning, innovating, and collaborating in today's hyper-complex world. The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research on new scientific ideas relevant to - ternational research agendas such as the EU (FP7), OECD, or UNESCO. We focus on the key aspects of a new sustainable deal for a bold response to the multidimensional crisis of our times.

Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.): Veronique... Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration (Paperback, 2009 ed.)
Veronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.

Transactions on Data Hiding and Multimedia Security IV (Paperback, 2009 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security IV (Paperback, 2009 ed.)
Yun Q. Shi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.

Agents and Peer-to-Peer Computing - 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited... Agents and Peer-to-Peer Computing - 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers (Paperback, 2008 ed.)
Sam Joseph, Zoran Despotovic, Moro Gianluca, Sonia Bergamaschi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2006, held in Hakodate, Japan, in May 2006, in the context of the 5th International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2006.

The 10 revised full papers and 6 revised short papers presented together with 1 invited paper were carefully reviewed and selected from 23 submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on P2P Infrastructure, agents in P2P, P2P search, and applications.

Intelligent Virtual Agents - 9th International Conference, IVA 2009 Amsterdam, The Netherlands, September 14-16, 2009... Intelligent Virtual Agents - 9th International Conference, IVA 2009 Amsterdam, The Netherlands, September 14-16, 2009 Proceedings (Paperback, 2009 ed.)
Zsofia Ruttkay, Michael Kipp, Anton Nijholt, Hannes Hoegni Vilhjalmsson
R2,733 Discovery Miles 27 330 Ships in 18 - 22 working days

Welcome to the proceedings of the 9th International Conference on Intelligent Virtual Agents, held September 14-16, 2009 in Amsterdam, The Netherlands. Intelligent virtual agents (IVAs) are interactive characters that exhibit hum- like qualities and communicate with humans or with each other using natural human modalities such as speech and gesture. They are capable of real-time perception, cognition and action, allowing them to participate in a dynamic physical and social environment. IVA is an interdisciplinary annual conference and the main forum for p- senting research on modeling, developing and evaluating IVAs with a focus on communicative abilities and social behavior. The development of IVAs requires expertise in multimodal interaction and several AI ?elds such as cognitive m- eling, planning, vision and natural language processing. Computational models are typically based on experimental studies and theories of human-human and human-robot interaction; conversely, IVA technology may provide interesting lessons for these ?elds. The realization of engaging IVAs is a challenging task, so reusable modules and tools are of great value. The ?elds of application range from robot assistants, social simulation and tutoring to games and artistic - ploration.

Financial Cryptography and Data Security - 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008.... Financial Cryptography and Data Security - 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers (Paperback, 2008 ed.)
Gene Tsudik
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier ?nancialand data security forum. The ProgramCommittee, led by the PCChair Gene Tsudik, achievedan excellent program balance between research, practice, and panel sessions. This year the program included two new additions, namely, a short-paper track and a poster session, both extremely well received. Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadeloupe, Bermuda, and the Grand Cayman. In 2008 we continued this t- dition and the conference was located in sunny Cozumel, Mexico. The ongoing carnival, sailing, submarine trips, and Mayan ruins were just a few of the - merous exciteme

Perception in Multimodal Dialogue Systems - 4th IEEE Tutorial and Research Workshop on Perception and Interactive Technologies... Perception in Multimodal Dialogue Systems - 4th IEEE Tutorial and Research Workshop on Perception and Interactive Technologies for Speech-Based Systems, PIT 2008, Kloster Irsee, Germany, June 16-18, 2008, Proceedings (Paperback, 2008 ed.)
Elisabeth Andre, Laila Dybkjaer, Heiko Neumann, Roberto Pieraccini, Michael Weber
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

The IEEE Tutorialand ResearchWorkshopon Perceptionand InteractiveTe- nologies for Multimodal Dialogue Systems (PIT 2008) is the continuation of a successful series of workshops that started with an ISCA Tutorial and Research WorkshoponMultimodalDialogueSystemsin1999.Thisworkshopwasfollowed by a second one focusing on mobile dialogue systems (IDS 2002), a third one exploring the role of a?ect in dialogue (ADS 2004), and a fourth one focusing on perceptive interfaces (PIT 2006). Like its predecessors, PIT 2008 took place at Kloster Irsee in Bavaria. Due to the increasing interest in perceptive interfaces, we decided to hold a follow-up workshop on the themes discussed at PIT 2006, but encouraged aboveallpaperswithafocusonperceptioninmultimodaldialoguesystems.PIT 2008received37 paperscoveringthe following topics (1) multimodal and spoken dialogue systems, (2) classi?cation of dialogue acts and sound, (3) recognitionof eye gaze, head poses, mimics and speech aswellascombinationsofmodalities, (4) vocal emotion recognition, (5) human-like and social dialogue systems and (6) evaluation methods for multimodal dialogue systems. Noteworthy was the strong participation from industry at PIT 2008. Indeed, 17 of the accepted 37 papers come from industrial organizations or were written in collaboration with them. Wewouldliketothankallauthorsforthe e?ortthey madewiththeirsubm- sions, and the Program Committee - nearly 50 distinguished researchers from industry and academia - who worked very hard to meet tight deadlines and selected the best contributions for the ?nal program. Special thanks goes to our invited speaker, Anton Batliner from Friedrich-Alexander-Universit] atErlangen- N] urnberg."

Informatics Education - Supporting Computational Thinking - Third International Conference on Informatics in Secondary Schools... Informatics Education - Supporting Computational Thinking - Third International Conference on Informatics in Secondary Schools - Evolution and Perspectives, ISSEP 2008 Torun Poland, July 1-4, 2008 Proceedings (Paperback, 2008 ed.)
Roland Mittermeir, Maciej M. Syslo
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days

Informatics Education - Supporting Computational Thinking contains papers presented at the Third International Conference on Informatics in Secondary Schools - Evolution and Perspective, ISSEP 2008, held in July 2008 in Torun, Poland. As with the proceedings of the two previous ISSEP conferences (2005 in Klag- furt, Austria, and 2006 in Vilnius, Lithuania), the papers presented in this volume address issues of informatics education transcending national boundaries and, the- fore, transcending differences in the various national legislation and organization of the educational system. Observing these issues, one might notice a trend. The p- ceedings of the First ISSEP were termed From Computer Literacy to Informatics F- damentals [1]. There, broad room was given to general education in ICT. The ECDL, the European Computer Driving License, propagated since the late 1990s, had pe- trated school at this time already on a broad scale and teachers, parents, as well as pupils were rather happy with this situation. Teachers had material that had a clear scope, was relatively easy to teach, and especially easy to examine. Parents had the assurance that their children learn "modern and relevant stuff," and for kids the c- puter was sufficiently modern so that anything that had to do with computers was c- sidered to be attractive. Moreover, the difficulties of programming marking the early days of informatics education in school seemed no longer relevant. Some colleagues had a more distant vision though.

Learning by Playing. Game-based Education System Design and Development - 4th International Conference on E-learning,... Learning by Playing. Game-based Education System Design and Development - 4th International Conference on E-learning, Edutainment 2009, Banff, Canada, August 9-11, 2009, Proceedings (Paperback, 2009 ed.)
Maiga Chang, Rita Kuo, Kinshuk, Gwo-Dong Chen, Michitaka Hirose
R2,960 Discovery Miles 29 600 Ships in 18 - 22 working days

With the widespread interest in digital entertainment and the advances in the technologies of computer graphics, multimedia and virtual reality technologies, the new area of "Edutainment" has been accepted as a union of education and computer entertainment. Edutainment is recognized as an effective way of learning through a medium, such as a computer, software, games or AR/VR applications, that both educates and entertains. The Edutainment conference series was established and followed as a special event for the new interests in e-learning and digital entertainment. The main purpose of Edutainment conferences is the discussion, presentation, and information exchange of scientific and technological developments in the new community. The Edutainment conference series is a very interesting opportunity for researchers, engineers, and graduate students who wish to communicate at these international annual events. The conference series includes plenary invited talks, workshops, tutorials, paper presen- tion tracks, and panel discussions. The Edutainment conference series was initiated in Hangzhou, China in 2006. Following the success of the first (Edutainment 2006 in Hangzhou, China), the second (Edutainment 2007 in Hong Kong, China), and the third events (Edutainment 2008 in Nanjing, China), Edutainment 2009 was held August 9-11, 2009 in Banff, Canada. This year, we received 116 submissions from 25 different countries and regions - cluding Austria, Canada, China, Denmark, Finland, France, Germany, Greece, Hong Kong, Italy, Japan, Korea, Malaysia, Mexico, The Netherlands, Norway, Portugal, Singapore, Spain, Sweden, Switzerland, Taiwan, Trinidad and Tobago, UK, and USA.

Ubiquitous Intelligence and Computing - 6th International Conference, UIC 2009, Brisbane, Australia, July 7-9, 2009,... Ubiquitous Intelligence and Computing - 6th International Conference, UIC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings (Paperback, 2009 ed.)
Daqing Zhang, Marius Portmann, Ah-Hwee Tan, Jadwiga Indulska
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This volume contains the proceedings of UIC 2009, the 6th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The UIC 2009 conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. The conference was also sponsored by the Australian Centre of - cellence in Information and Communication Technologies (NICTA). UIC 2009 was accompanied by six workshops on a variety of research challenges within the area of ubiquitous intelligence and computing. The conference was held in Brisbane, Australia, July 7-9, 2009. The event was the sixth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (Second International Symposium on Ubiquitous Intelligence and Smart Worlds) held in December 2005 in Japan. Since 2006, the conference has been held annually under the name UIC (International Conference on Ubiquitous Intelligence and Computing). UIC 2006 was held in September 2006 in Wuhan andThreeGorges, China, followedbyUIC2007heldinJuly2007inHongKong, and UIC 2008 held in June 2008 in Oslo, Norway. Ubiquitous sensors, computers, networksand informationare paving the way towardasmartworldinwhichcomputationalintelligenceisdistributedthrou- out the physical environment to provide reliable and relevant services to peop

Global Security, Safety, and Sustainability - 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009,... Global Security, Safety, and Sustainability - 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings (Paperback, 2009 ed.)
Hamid Jahankhani, Ali G. Hessami, Feng Hsu
R1,396 Discovery Miles 13 960 Ships in 18 - 22 working days

The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu

User Modeling, Adaptation, and Personalization - 17th International Conference, UMAP 2009, formerly UM and AH, Trento, Italy,... User Modeling, Adaptation, and Personalization - 17th International Conference, UMAP 2009, formerly UM and AH, Trento, Italy, June 22-26, 2009, Proceedings (Paperback, 2009 ed.)
Geert-Jan Houben, Gordon McCalla, Fabio Pianesi, Massimo Zancanaro
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This book constitutes the proceedings of the First International Conference on User Modeling, Adaptation, and Personalization, held in Trento, Italy, on June 22-26, 2009.

This annual conference was merged from the biennial conference series User Modeling, UM, and the conference on Adaptive Hypermedia and Adaptive Web-Based Systems, AH.

The 53 papers presented together with 3 invited talks were carefully reviewed and selected from 125 submissions. The tutorials and workshops were organized in topical sections on constraint-based tutoring systems; new paradigms for adaptive interaction; adaption and personalization for Web 2.0; lifelong user modeling; personalization in mobile and pervasive computing; ubiquitous user modeling; user-centered design and evaluation of adaptive systems.

Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities... Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities (Paperback, 2009 ed.)
Melanie Volkamer
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections.

To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.

The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.

Agent and Multi-Agent Systems: Technologies and Applications - Third KES International Symposium, KES-AMSTA 2009, Uppsala,... Agent and Multi-Agent Systems: Technologies and Applications - Third KES International Symposium, KES-AMSTA 2009, Uppsala, Sweden, June 3-5, 2009, Proceedings (Paperback, 2009 ed.)
Anne Hakansson, Ronald Hartung
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

This volume contains the proceedings of the Third KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2009)--held at Uppsala University in Sweden during June 3-5, 2009. The symposium was organized by Uppsala University, KES International and its Focus Group on Agent and Multi-agent Systems. The KES-AMSTA Symposium series is a sub-series of the KES Conference series. Following the successes of the First KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2007), held in Wroclaw, Poland, from May 31 to 1 June 2007--and the Second KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2008) held in Incheon, Korea, March 26-28, 2008--KES-AMSTA 2009 featured keynote talks, oral and poster presentations, and a number of workshops and invited sessions, closely aligned to the themes of the conference. The aim of the symposium was to provide an international forum for scientific - search into the technologies and applications of agent and multi-agent systems. Agent and multi-agent systems are an innovative type of modern software system and have long been recognized as a promising technology for constructing autonomous, c- plex and intelligent systems. A key development in the field of agent and multi-agent systems has been the specification of agent communication languages and formali- tion of ontologies. Agent communication languages are intended to provide standard declarative mechanisms for agents to communicate knowledge and make requests of each other, whereas ontologies are intended for conceptualization of the knowledge domain.

Advances in Artificial Intelligence - 22nd Canadian Conference on Artificial Intelligence, Canadian AI 2009, Kelowna, Canada,... Advances in Artificial Intelligence - 22nd Canadian Conference on Artificial Intelligence, Canadian AI 2009, Kelowna, Canada, May 25-27, 2009 Proceedings (Paperback, 2009 ed.)
Yong Gao, Nathalie Japkowicz
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 22nd Conference on Artificial Intelligence, Canadian AI 2009, held in Kelowna, Canada, in May 2009.

The 15 revised full papers presented together with 19 revised short papers, 8 papers from the graduate student symposium and the abstracts of 3 keynote presentations were carefully reviewed and selected from 63 submissions. The papers present original high-quality research in all areas of Artificial Intelligence and apply historical AI techniques to modern problem domains as well as recent techniques to historical problem settings.

Digital Human Modeling - Trends in Human Algorithms (Paperback, 2008 ed.): Yang Cai Digital Human Modeling - Trends in Human Algorithms (Paperback, 2008 ed.)
Yang Cai
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The emerging information technologies have enabled new human patterns ranging from physiological interactions to psychological interactions. Perhaps the best example is the rapid 'evolution' of our thumbs from simply holding to controlling mobile devices in just a few years recently. Taking the medical field as an example, the fast-growing technologies such as pill cameras, implantable devices, robotic surgeries, and virtual reality training methods will change the way we live and work. Human Algorithms aim to model human forms, interactions, and dynamics in this new context. Human Algorithms are engineering methods that are beyond theories. They intend to push the envelopes of multi-physics, sensing, and virtual technologies to the limit. They have become more comprehensive and inexpensive for use in real-world designs: inside monitors, connected to networks, and under the patient's skin. This book aims to reflect the state of the art of Human Algorithms. It is a survey of innovative ideas for readers who may be new to this field. The targeted groups include college students, researchers, engineers, designers, scientists, managers, and healthcare professionals. The 11 chapters are divided into three parts: Human Dynamics, Virtual Humans, and Human Forms. Part I: Human Dynamics. In the first chapter "Implantable Computing," Warwick and Gasson present an overview of the latest developments in the field of Brain to Computer Interfacing. They describe human experimentation in which neural implants have linked the human nervous system bi-directionally with technological devices and the Internet. In the chapter "Brainwave-Based Imagery Analysis," Cowell et al.

Financial Cryptography and Data Security - 11th International Conference, FC 2007, and First International Workshop on Usable... Financial Cryptography and Data Security - 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers (Paperback, 2007 ed.)
Sven Dietrich, Rachna Dhamija
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007.

The book includes 17 revised full papers, 1 system presentation paper and the transcriptions of 5 panel sessions from FC 2007. The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections on Payment Systems, Anonymity, Authentication, Anonymity and Privacy, Cryptography and Commercial Transactions, Financial Transactions and Web Services, and Cryptography. The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This workshop brought together an interdisciplinary group of researchers and practitioners to discuss usability problems and deepen the understanding of users' capabilities and motivations in performing security tasks.

Advances in Web Mining and Web Usage Analysis - 9th International Workshop on Knowledge Discovery on the Web, WebKDD 2007, and... Advances in Web Mining and Web Usage Analysis - 9th International Workshop on Knowledge Discovery on the Web, WebKDD 2007, and 1st International Workshop on Social Networks Analysis, SNA-KDD 2007, San Jose, CA, USA, August 12-15, 2007, Revised Papers (Paperback, 2009 ed.)
Haizheng Zhang, Myra Spiliopoulou, Bamshad Mobasher, C.Lee Giles, Andrew McCallum, …
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days

Thisyear'svolumeofAdvancesinWebMiningandWebUsageAnalysiscontains thepostworkshopproceedingsofajointevent,the9thInternationalWorkshopon Knowledge Discovery from the Web (WEBKDD 2007) and the First SNA-KDD Workshop on Social Network Analysis (SNA-KDD 2007). The joint workshop on Web Mining and Social Network Analysis took place at the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). It attracted 23 submissions, of which 14 were accepted for presentation at the workshop. Eight of them have been extended for inclusion in this volume. WEBKDD is one of the most traditional workshops of the ACM SIGKDD internationalconference, under the auspices of which it has been organizedsince 1999. The strong interest for knowledge discovery in the Web, fostered not least by WEBKDD itself, has led to solutions for many problems in the Web's p- mature era. In the meanwhile, the Web has stepped into a new era, where it is experienced as a social medium, fostering interaction among people, enabling and promoting the sharing of knowledge, experiences and applications, char- terized by group activities, community formation, and evolution. The design of Web 2. 0 re?ects the socialcharacterof the Web, bringing new potential and new challenges. The 9th WEBKDD was devoted to the challenges and opportunities of mining for the social Web and promptly gave rise to the joint event with the First Workshop on Social Network Analysis (SNA-KDD). Social network research has advanced signi?cantly in the last few years, strongly motivated by the prevalence of online social websites and a variety of large-scale o?ine social network systems.

Internet and Network Economics - 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings... Internet and Network Economics - 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings (Paperback, 2008 ed.)
Christos Papadimitriou, Shuzhong Zhang
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

This volume contains the papers presented at the International Workshop on Internet and Network Economics held during December 17-20, 2008, in Sha- hai, China, for its fourth edition. WINE 2008 provided a forum for researchers from di?erent disciplines to communicate with each other and exchange their researching ?ndings in this emerging ?eld. WINE 2008hadteninvitedspeakers: FanChungGraham, MatthewJackson, Lawrence Lau, Tom Luo, Eric Maskin, Paul Milgrom, Christos Papadimitriou, Herbert Scarf, Hal Varian and Yinyu Ye. There were 126 submissions. Each submission was reviewed on average by 2. 5 Programme Committee members. The Committee decided to accept 68 papers. The programme also included 10 invited talks. This ?nal program contained papers covering topics including equilibrium, information markets, sponsored auction, network economics, mechanism - sign, socialnetworks, advertisementpricing, computationalequilibrium, network games, algorithms and complexity for games. December 2008 Christos Papadimitriou Shuzhong Zhang Organization Programme Chairs Conference Chair Herbert E. Scarf (Yale University) Program Co-chair Christos Papadimitriou (UC Berkeley) Program Co-chair Shuzhong Zhang (Chinese University of Hong Kong) Local Organizing Committee Chairs Committee Chair Yifan Xu (Fudan University) Committee Co-chair Duan Li (Chinese University of Hong Kong) Committee Co-chair ShouyangWang(ChineseAcademyofSciences) Committee Co-chair Xiaoping Zhao (SSE INFONE

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R348 Discovery Miles 3 480
Security and Privacy in the Internet of…
AI Awad Hardcover R3,118 Discovery Miles 31 180
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,520 Discovery Miles 25 200
The Everyday Life of an Algorithm
Daniel Neyland Hardcover R1,285 Discovery Miles 12 850
The Alignment Problem - Machine Learning…
Brian Christian Paperback R598 R371 Discovery Miles 3 710
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R505 Discovery Miles 5 050
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450
Handbook on Crime and Technology
Don Hummer, James M. Byrne Hardcover R7,104 Discovery Miles 71 040
The Citizen Marketer
Joel Penney Hardcover R3,274 Discovery Miles 32 740
The Changing Scope of Technoethics in…
Rocci Luppicini Hardcover R5,623 Discovery Miles 56 230

 

Partners