![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication (CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is new, relevant, and cutting edge in the areas of CMC and social media, authors critically explore topics ranging from social media theories to civil rights. Divided into three parts, the handbook begins with theory and methods, which sets the foundation for the text and then moves into the applicability of strategy, tactics, and measurement. The final focus is toward the future of CMC and social media and its impact on the study and practice of communication. Uniquely relating social media communication research to its computer-mediated communication foundation, as well as digital and emerging media trends, this handbook is an indispensable resource whether you're a graduate student or a seasoned practitioner.
This book covers the basic theory of mean field game (MFG) and its applications in wireless networks. It starts with an overview of the current and future state-of-the-art in 5G and 6G wireless networks. Then, a tutorial is presented for MFG, mean-field-type game (MFTG), and prerequisite fields of study such as optimal control theory and differential games. This book also includes a literature survey of MFG-based research in wireless network technologies such as ultra-dense networks (UDNs), device-to-device (D2D) communications, internet-of-things (IoT), unmanned aerial vehicles (UAVs), and mobile edge networks (MENs). Several applications of MFG and MFTG in UDNs, social networks, and multi-access edge computing networks (MECNs) are introduced as well. Applications of MFG covered in this book are divided in three parts. The first part covers three single-population MFG research works or case studies in UDNs including ultra-dense D2D networks, ultra-dense UAV networks, and dense-user MECNs. The second part centers on a multiple-population MFG (MPMFG) modeling of belief and opinion evolution in social networks. It focuses on a recently developed MPMFG framework and its application in analyzing the behavior of users in a multiple-population social network. Finally, the last part concentrates on an MFTG approach to computation offloading in MECN. The computation offloading algorithms are designed for energy- and time-efficient offloading of computation-intensive tasks in an MECN. This book targets advanced-level students, professors, researchers, scientists, and engineers in the fields of communications and networks. Industry managers and government employees working in these same fields will also find this book useful.
Set up Skype on Windows, Mac OS® X, or PocketPC See how to use Skype for secure chats and to connect using SkypeIn and SkypeOut Here's the "fun and easy way" to understand all the hype about Skype and make this cool alternative communication system work for you! You'll get great advice about hardware, directions for downloading and installing Skype, ideas for using Skype in your business, and the lowdown on making Skype calls to people with old-fashioned phones. Discover how to Install Skype and start making calls Create a contacts list Set up voicemail and call forwarding Use Skype for worldwide conference calls and Skypecasting Enhance Skype with Bluetooth, Wi-Fi wireless, and video
Game design is a sibling discipline to software and Web design, but they're siblings that grew up in different houses. They have much more in common than their perceived distinction typically suggests, and user experience practitioners can realize enormous benefit by exploiting the solutions that games have found to the real problems of design. This book will show you how.
Is the Enterprise Information Portal (EIP) knowledge management's
killer app? Leading expert Joseph M. Firestone, the first author to
formulate the idea of the Enterprise Knowledge Portal, breaks new
ground and looks to the future with a practical, but comprehensive
approach to enterprise portals and their relationship to knowledge
management. Providing a clear and novel overview, Firestone tackles
a wide range of topics ranging from functional EIP applications,
estimating costs and benefits of EIPs, variations in EIP technical
architecture, the role of intelligent agents, the nature of
knowledge management, portal product/solution segmentation, portal
product case studies, to the future of the EIP space.
This book discusses Internet of Things (IoT) as it relates to enterprise applications, systems, and infrastructures. The authors discuss IoT and how it's disrupting industries such as enterprise manufacturing, enterprise transportation, enterprise smart market, enterprise utilities, and enterprise healthcare. They cover how IoT in the enterprise will have a major impact on the lives of consumers and professionals around the world and how it will change the way we think about professional and consumer networks. The book's topics include IoT enterprise system architecture, IoT enabling enterprise technologies, and IoT enterprise services and applications. Examples include enterprise on demand, market impacts, and implications on smart technologies, big data enterprise management, and future enterprise Internet design for various IoT use cases, such as share markets, healthcare, smart cities, smart environments, smart communications and smart homes.
The Web is the nervous system of information society. As such, it has a pervasive influence on our daily lives. And yet, in some ways the Web does not have a high MIQ (Machine IQ). What can be done to enhance it? This is the leitmotif of "Intelligent Exploration of the Web," (lEW)--a collection of articles co-edited by Drs. Szczepaniak, Segovia, Kacprzyk and, to a small degree, myself. The articles that comprise lEW address many basic problems ranging from structure analysis of Internet documents and Web dialogue management to intelligent Web agents for extraction of information, and bootstrapping an ontology-based information extraction system. Among the basic problems, one that stands out in importance is the problem of search. Existing search engines have many remarkable capabilities. But what is not among them is the deduction capability--the capability to answer a query by drawing on information which resides in various parts of the knowledge base. An example of a query might be "How many Ph.D. degrees in computer science were granted by European universities in 1996?" No existing search engine is capable of dealing with queries of comparable or even much lower complexity. Basically, what we would like to do is to add deduction capability to a search engine, with the aim of transforming it into a question-answering system, or a QI A system, for short. This is a problem that is of major importance and a challenge that is hard to meet.
Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication networks. The objective of this book is to advance and promote the theory and applications of combinatorial optimization in communication networks. Each chapter of the book is written by an expert dealing with theoretical, computational, or applied aspects of combinatorial optimization. Topics covered in the book include the combinatorial optimization problems arising in optical networks, wireless ad hoc networks, sensor networks, mobile communication systems, and satellite networks. A variety of problems are addressed using combinatorial optimization techniques, ranging from routing and resource allocation to QoS provisioning.
'E-business Implementation' is written as a complete guide to
successful e-business delivery, from both a project management and
a detailed technological perspective.
Explore ways to bring and keep your library's electronic services up to date!From editor Di Su: "Some years ago, if you were told that a library's catalog would be available on a 24/7/365 basis, you'd think it was just another fiction. Perhaps as influential as Johannes Gutenberg's invention of movable type printing, the Internet is one of the most significant happenings in the information world in modern times."In addition to showing you how library services have been influenced and enhanced by the advent of the Internet, Evolution in Reference and Information Services: The Impact of the Internet will enable you to make the most of the new opportunities that current technologies offer. This valuable book will also help you and your library avoid the pitfalls and new challenges to professional competency that come along with electronic research.Evolution in Reference and Information Services: gives you a review of the history of electronic reference looks at the increasing role of librarians as teachers and providers of technical help for users provides case studies and ways to evaluate electronic research methods suggests strategies for providing effective electronic services examines government Web sites explores Internet sources of health information shows you how to establish electronic services through your library's portal site looks at how to manage a library computer lab and much more!
This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.
Design and implement successful Web-based courses This wide-ranging book discusses both the micro and macro aspects of using the Internet to enhance your travel and tourism curriculum. The Internet and Travel and Tourism Education offers useful insights for both novices and experienced users. With these suggestions, you can use online resources to contribute to your class objectives. The innovative teaching strategies presented in The Internet and Travel and Tourism Education will not soon become outdated. Instead of being based on fast-changing technical details, such as specific programs, the ideas are rooted in the way information is presented and absorbed. By tapping the power of the Internet, you can find more effective ways to teach the skills and facts your students need. The Internet and Travel and Tourism Education provides helpful advice and information on essential aspects of this powerful tool, including: Web-based instruction students'perceptions of Internet courses using the Web to expand content areas an Internet-based master's degree program administrative issues managing multimedia projects The Internet and Travel and Tourism Education will help you offer the best possible education for your students and stay up-to-date in an increasingly competitive world.
I3E 2001 is the first in a series of conferences on e-commerce, e-business, and- government organised by the three IFIP committees TC6, TC8, and TC11. It provides a forum, where users, engineers, and scientists from academia, industry, and government can present their latest findings in e-commerce, e-business, and- government applications and the underlying technology to support those applications. The conference comprises a main track and mini tracks dedicated to special topics. The papers presented in the main track were rigorously refereed and selected by the International Programme Committee of the conference. Thematically they were grouped in the following sessions: - Sessions on security and trust, comprising nine papers referring to both trust and security in general as well as presenting specific concepts for enhancing trust in the digital society. - Session on inter-organisational transactions, covering papers related to auditing of inter-organizational trade procedures, cross-organizational workflow and transactions in Business to Business platforms. - Session on virtual enterprises, encompassing papers describing innovative approaches for creating virtual enterprises as well as describing examples of virtual enterprises in specific industries. - Session on online communities containing three papers, which provide case studies of specific online communities and various concepts on how companies can build and harness the potential of online communities. - Sessions on strategies and business models with papers describing specific business models as well as general overviews of specific approaches for E- Strategy formulation.
This book develops the object-oriented programming skills of experienced programmers (at the Junior, Senior or above level) by showing how to use Java 2 (the latest release of Sun's Java platform), and by providing a complete understanding of the philosophy behind Java 2. It starts out covering the language-independent concepts that are at the heart of the Java world, and then moves on to introduce Java through several example programs. Following this is an in-depth discussion on inheritance and polymorphism. Finally, the book concludes with material on important features of Java that are not object-oriented.
'e-Business Strategies for Virtual Organizations' enables IT
managers and directors to develop and implement IT strategies and
infrastructures for new models of doing business based on the
Internet.
It demonstrates how features such as animation and audio can be employed to ensure web sites are used to their full potential and therefore helps to create professional products that will secure a positive image of the company or product they are promoting. It is accessible and simplifies the authoring experience so that even those with little or no previous knowledge of creating web pages can develop and innovate stimulating and interactive features to enhance their content.
The only beginning book of its kind, this book will teach you SAP/ABAP developers the skills you need for Java 5 programming. The book emphasizes the fundamentals of core Java SE 5 and Java EE 5, to get you up to speed with these technologies. You'll learn about the most important enterprise Java API found in the new Java EE 5 platform, which you can immediately use and integrate. Furthermore, the book elaborates on connecting to a database, SAP Java Connector, servlets, Java Server Pages, Enterprise JavaBeans, and Java Messaging.
Surveys indicate that many E-Business efforts either fail or disrupt the basic business processes and transactions. E-Business is sometimes not aligned with the business or IT. Vague vision statements are not translated into specific actions related to E- Business. It is because of these factors that Transform Your Business into e was written. The book covers E-Business from the review of the business at the start to expanding E-Business after it is live.
* Recommended by T.Basar, SC series ed. * This text addresses a new, active area of research and fills a gap in the literature. * Bridges mathematics, engineering, and computer science; considers stochastic and optimization aspects of congestion control in Internet data transfers. * Useful as a supplementary text & reference for grad students with some background in control theory; also suitable for researchers.
This is one of the first books on the subject of counseling clients
via e-mail. The author has taken the area of counseling practice
and systematically reviewed relevant counseling theory, counseling
ethics, and counseling skills in relation to Web counseling. The
objective is to provide a practical text and guide for career
counselors in online service. This book will be of interest to
professionals in the field of career counseling, to graduate
students of counseling, and to human resource management and
outplacement professionals.
This text introduces the concepts of information warfare from a
non-military, organizational perspective. It is designed to
stimulate managers to develop policies, strategies, and tactics for
the aggressive use and defence of their data and knowledge base.
The book covers the full gambit of information warfare subjects
from the direct attack on computer systems to the more subtle
psychological technique of perception management. It provides the
framework needed to build management strategies in this area. The
topics covered include the basics of information warfare, corporate
intelligence systems, the use of deception, security of systems,
modes of attack, a methodology to develop defensive measures, plus
specific issues associated with information warfare. |
![]() ![]() You may like...
Grouping Genetic Algorithms - Advances…
Michael Mutingi, Charles Mbohwa
Hardcover
R4,597
Discovery Miles 45 970
Computational Intelligence and…
Maude Josee Blondin, Panos M. Pardalos, …
Hardcover
Provenance in Data Science - From Data…
Leslie F Sikos, Oshani W. Seneviratne, …
Hardcover
R3,890
Discovery Miles 38 900
Handbook of Research on Modeling…
Sujata Dash, B. K. Tripathy, …
Hardcover
R7,069
Discovery Miles 70 690
Air Traffic Control Automated Systems
Bestugin A.R., Eshenko A.A., …
Hardcover
R3,395
Discovery Miles 33 950
Data Science and Internet of Things…
Giancarlo Fortino, Antonio Liotta, …
Hardcover
R4,234
Discovery Miles 42 340
Computing Algorithms with Applications…
V. K. Giri, Nishchal K. Verma, …
Hardcover
R4,432
Discovery Miles 44 320
|