![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request phase in which a station reserves the communication channel and a transmission phase in which the actual data transmission takes place. Such procedures are often applied in communication networks that are characterised by a shared communication channel with large round-trip times. In this book, we propose queuing models for situations that require a reservation procedure and validate their applicability in the context of cable networks. We offer various mathematical models to better understand the performance of these reservation procedures. The book covers four key performance models, and modifications to these: Contention trees, the repairman model, the bulk service queue, and tandem queues. The relevance of this book is not limited to reservation procedures and cable networks, and performance analysts from a variety of areas may benefit, as all models have found application in other fields as well.
For the first time in history, the International Federation for Information Processing (IFIP) and the International Medical Informatics Association (IMIA) held the joint "E-Health" Symposium as part of "Treat IT" stream of the IFIP World Congress 2010 at Brisbane, Australia during September 22-23, 2010. IMIA is an independent organization established under Swiss law in 1989. The organization originated in 1967 from Technical Committee 4 of IFIP that is a n- governmental, non-profit umbrella organization for national societies working in the field of information processing. It was established in 1960 under the auspices of UNESCO following the First World Computer Congress held in Paris in 1959. Today, IFIP has several types of members and maintains friendly connections to specialized agencies of the UN system and non-governmental organizations. Technical work, which is the heart of IFIP's activity, is managed by a series of Technical Committees. Due to strong needs for promoting informatics in healthcare and the rapid progress of information and communication technology, IMIA President Reinhold Haux p- posed to strengthen the collaboration with IFIP. The IMIA General Assembly (GA) approved the move and an IMIA Vice President (VP) for special services (Hiroshi Takeda) was assigned as a liaison to IFIP at Brisbane during MEDINFO2007 where th the 40 birthday of IMIA was celebrated.
The Internet is quickly becoming a commonly used tool for business-customer interaction. Social media platforms that were once typically reserved for personal use are now becoming a vital part of a business's strategy. Maximizing Commerce and Marketing Strategies through Micro-Blogging examines the various methods and benefits of using micro-blogs within a business context, bringing together the best tools and tactics necessary to properly incorporate this approach. Highlighting current empirical research and insights from various disciplines, this book is an essential reference source for academics, graduate students, social media strategists, and business professionals interested in the positive use of social media in business environments.
The Future of Digital Data, Heritage and Curation critiques digital cultural heritage concepts and their application to data, developing new theories, curatorial practices and a more-than-human museology for a contemporary and future world. Presenting a diverse range of case examples from around the globe, Cameron offers a critical and philosophical reflection on the ways in which digital cultural heritage is currently framed as societal data worth passing on to future generations in two distinct forms: digitally born and digitizations. Demonstrating that most perceptions of digital cultural heritage are distinctly western in nature, the book also examines the complicity of such heritage in climate change, and environmental destruction and injustice. Going further still, the book theorizes the future of digital data, heritage, curation and the notion of the human in the context of the profusion of new types of societal data and production processes driven by the intensification of data economies and through the emergence of new technologies. In so doing, the book makes a case for the development of new types of heritage that comprise AI, automated systems, biological entities, infrastructures, minerals and chemicals - all of which have their own forms of agency, intelligence and cognition. The Future of Digital Data, Heritage and Curation is essential reading for academics and students engaged in the study of museums, archives, libraries, galleries, archaeology, cultural heritage management, information management, curatorial studies and digital humanities.
This book covers several aspects related the evolution of Information Systems into Pervasive Information Systems. New IT trends have an important impact on IT infrastructures, which become increasingly heterogeneous, flexible, and dynamic. These new trends are transforming Information Systems into what we call Pervasive Information Systems. The purpose of this book is to combine "state-of-the-art" solutions from various research communities (such as Information Systems Engineering, Cloud Computing, Fog/Edge Computing, Pervasive systems, Distributed systems, and Middleware systems) related to the Pervasive Information Systems emergence as a common point of view. Through these multiple contributions, this book tackles important challenges concerning Information Systems evolution, promoting a holistic view of Pervasive Information System. Pervasive Information Systems (PIS) can be defined as a new class of Information Systems. It can be characterized by an IT that is gradually embedded in the physical environment and can accommodate the user's requirements and desires when necessary. This evolution implies considering Information Systems beyond the organization's physical environment to integrate new technologies transparently, leading to a pervasive environment whose behavior should be more and more reactive & proactive. It corresponds to an important change in Information Systems Engineering. Pervasive Information Systems are deeply multidisciplinary systems, demanding a holistic view in which multiple domains are invited to contribute.
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2.0.0. This book explores Cypress scripts that help implement 'shift left testing', which is a dream come true for many software testers. Shift left occurs in the majority of testing projects, but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus, defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor, which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!
This book constitutes the refereed post-conference proceedings of the Fourth IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2021, held in Chennai, India, in March 2021. The 20 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers cover topics such as computational intelligence for text analysis; computational intelligence for image and video analysis; blockchain and data science.
Towards collaborative business ecosystems Last decade was fertile in the emerging of new collaboration mechanisms and forms of dynamic virtual organizations, leading to the concept of dynamic business ecosystem, which is supported (or induced ?) by the progress of the ubiquitous I pervasive computing and networking. The new technologies, collaborative business models, and organizational forms supported by networking tools "invade" all traditional businesses and organizations what requires thinking in terms of whole systems, i. e. seeing each business as part of a wider economic ecosystem and environment. It is also becoming evident that the agile formation of very dynamic virtual organizations depends on the existence of a proper longer-term "embedding" or "nesting" environment (e. g. regional industry cluster), in order to guarantee certain basic requirements such as trust building ("Trusting your partner" is a gradual and long process); common interoperability, ontology, and distributed collaboration infrastructures; agreed business practices (requiring substantial engineering Ire-engineering efforts); a sense of community ("we vs. the others"), and some sense of stability (when is a dynamic state or a stationary state useful). The more frequent situation is the case in which this "nesting" environment is formed by organizations located in a common region, although geography is not a major facet when cooperation is supported by computer networks.
This guide teaches programmers who have been left behind in the IBM i's evolution to code more productively and modernize their business applications. Shirey uses a casual, humorous teaching style to explain the concepts, along with plenty of code examples. Readers will gain confidence in areas that may be new to them and use the provided examples to practice what they've learned. The manual is structured so that whether they are using the latest IBM i technology or an older version, readers will learn methods to improve coding and applications, as well as become comfortable with writing programs using ILE RPG, free-format RPG, and Model-View-Controller (MVC).
The explosive expansion of the Internet has led to dramatic shifts in the methodology of conducting business, allowing for instantaneous communication and activities. ""Proliferation of the Internet Economy: E-Commerce for Global Adoption, Resistance, and Cultural Evolution"" provides deep insight into the globalization of e-commerce and the minimization of the digital divide between developed and developing countries. This book specifically addresses and explains the adoption and proliferation of global e-commerce.
This book features a selection of extended papers presented at the 9th IFIP WG 12.6 International Workshop on Artificial Intelligence for Knowledge Management, AI4KM 2021, and the 1st International Workshop on Energy and Sustainability, AIES 2021, named AI4KMES 2021 and held in conjunction with IJCAI 2021 in August 2021. The conference was planned to take place in Montreal, Canada, but changed to an online event due to the COVID-19 pandemic. The 15 papers included in this book were carefully reviewed and selected from 17 submissions. They deal with knowledge management and sustainability challenges, focusing on methodological, technical and organizational aspects of AI used for facing related complex problems. This year's topic was AI for Knowledge Management, Energy and Sustainable Future.
The first section of Semantic Web and Education surveys the basic aspects and features of the Semantic Web. After this basic review, the book turns its focus to its primary topic of how Semantic Web developments can be used to build attractive and more successful education applications. The book analytically discusses the technical areas of architecture, metadata, learning objects, software engineering trends, and more. Integrated with these technical topics are the examinations of learning-oriented topics such as learner modeling, collaborative learning, learning management, learning communities, ontological engineering of web-based learning, and related topics. The result is a thorough and highly useful presentation on the confluence of the technical aspects of the Semantic Web and the field of Education or the art of teaching. The book will be of considerable interest to researchers and students in the fields Information Systems, Computer Science, and Education.
This book is the second edition of the popular 1996 title "Electronic Publishing and Libraries: Planning for the Impact and Growth to 2003," which is an essential update arising from the need for scholarly information dissemination in this area due to the rapid pace of change. There are two noticeable improvements to this edition compared to the last one. Firstly, the organization of the material is separated into groups involved in the electronic publishing industry, making it easier for users to find relevant information. Secondly, the book is now larger in size allowing it to present the detailed diagrams more clearly. Like the previous edition, the title still aims to quantify the future size of the electronic publishing industry and provides practical data to support investment decisions in information systems for electronic media and serves as an aid to forward planning. Plus, all the sources of the original book are revisited and updated.
Semantics and ontologies offer an extension to traditional information systems in which information is given well-defined meaning, enabling computers and people to work in cooperation. With expanding uses and integrations of semantics and ontologies, research in Semantic Web engineering has grown immensely. Semantic Web Engineering in the Knowledge Society brings together contributions from researchers and scientists from both industry and academia and representatives from different communities for the understanding and exploration of the theories, tools, and applications of semantics and ontologies. This authoritative reference serves as the platform for exchange of both practical technologies and far reaching implications, offering academicians and practitioners a compendium of knowledge in Semantic Web engineering.
The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule."
'Witty, rigorous, and as urgent as a fire alarm' Dorian Lynskey 'Cooly prosecutorial' Guardian Nobody meant for this to happen. Facebook didn't mean to facilitate a genocide. Twitter didn't want to be used to harass women. YouTube never planned to radicalise young men. But with billions of users, these platforms need only tweak their algorithms to generate more 'engagement'. In so doing, they bring unrest to previously settled communities and erode our relationships. Social warming has happened gradually - as a by-product of our preposterously convenient digital existence. But the gradual deterioration of our attitudes and behaviour on- and offline - this vicious cycle of anger and outrage - is real. And it can be corrected. Here's how.
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
From the respected instructor and author Paul Addison, PRINCIPLES OF PROGRAM DESIGN: PROBLEM SOLVING WITH JAVASCRIPT, International Edition presents the fundamental concepts of good program design, illustrated and reinforced by hands-on examples using JavaScript. Why JavaScript? It simply illustrates the programming concepts explained in the book, requires no special editor or compiler, and runs in any browser. Little or no experience is needed because the emphasis is on learning by doing. There are examples of coding exercises throughout every chapter, varying in length and representing simple to complex problems. This book encourages you to think in terms of the logical steps needed to solve a problem, and you can take these skills with you to any programming language in the future. To help reinforce concepts, each chapter has a chapter summary, review questions, hand-on activities, and a case study hat you build on in each chapter.
This book presents Internet of Things (IoT) solutions monitoring and assessing a variety of applications areas for indoor air quality (IAQ). This book synthesizes recent developments, presents case studies, and discusses new methods in the area of air quality monitoring, all the while addressing public health concerns. The authors discuss the issues and solutions, including IoT systems that can provide a continuous flow of data retrieved from cost-effective sensors that can be used in multiple applications.The authors present the leading IoT technologies, applications, algorithms, systems, and future scope in this multi-disciplinary domain.
In surrealist artist Paul Klee's The Twittering Machine, the bird-song of a diabolical machine acts as bait to lure humankind into a pit of damnation. Leading political writer and broadcaster Richard Seymour argues that this is a chilling metaphor for our relationship with social media. Former social media executives tell us that the system is an addiction-machine. We are users, waiting for our next hit as we like, comment and share. We write to the machine as individuals, but it responds by aggregating our fantasies, desires and frailties into data, and returning them to us as a commodity experience. Through journalism, psychoanalytic reflection and insights from users, developers, security experts and others, Seymour probes the human side of the machine, asking what we're getting out of it, and what we're getting into. |
You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,745
Discovery Miles 37 450
|