![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
In this volume, Rudi Studer and his team deliver a self-contained compendium about the exciting field of Semantic Web services, starting with the basic standards and technologies and also including advanced applications in eGovernment and eHealth. The contributions provide both the theoretical background and the practical knowledge necessary to understand the essential ideas and to design new cutting-edge applications.
Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the infrastructure. Terminological Ontologies: Design, Management and Practical Applications presents the main problems that affect the discovery systems of information infrastructures to manage terminological models, and introduces a combination of research tools and applications in Semantic Web technologies. This book specifically analyzes the need to create, relate, and integrate the models required for an infrastructure by elaborating on the problem of accessing these models in an efficient manner via interoperable services and components. Terminological Ontologies: Design, Management and Practical Applications is geared toward information management systems and semantic web professionals working as project managers, application developers, government workers and more. Advanced undergraduate and graduate level students, professors and researchers focusing on computer science will also find this book valuable as a secondary text or reference book.
In the early days of the Web a need was recognized for a language
to display 3D objects through a browser. An HTML-like language,
VRML, was proposed in 1994 and became the standard for describing
interactive 3D objects and worlds on the Web. 3D Web courses were
started, several best-selling books were published, and VRML
continues to be used today. However VRML, because it was based on
HTML, is a stodgy language that is not easy to incorporate with
other applications and has been difficult to add features to.
Meanwhile, applications for interactive 3D graphics have been
exploding in areas such as medicine, science, industry, and
entertainment. There is a strong need for a set of modern Web-based
technologies, applied within a standard extensible framework, to
enable a new generation of modeling & simulation applications
to emerge, develop, and interoperate. X3D is the next generation
open standard for 3D on the web. It is the result of several years
of development by the Web 3D Consortium's X3D Task Group. Instead
of a large monolithic specification (like VRML), which requires
full adoption for compliance, X3D is a component-based architecture
that can support applications ranging from a simple non-interactive
animation to the latest streaming or rendering applications. X3D
replaces VRML, but also provides compatibility with existing VRML
content and browsers. Don Brutzman organized the first symposium on
VRML and is playing a similar role with X3D; he is a founding
member of the consortium. Len Daly is a professional member of the
consortium and both Len and Don have been involved with the
development of the standard from the start.
Visual Knowledge Modeling for Semantic Web Technologies: Models and Ontologies aims to make visual knowledge modeling available to individuals as an intellectual method and a set of tools at different levels of formalization. It aims to provide to its readers a simple, yet powerful visual language to structure their thoughts, analyze information, transform it to personal knowledge, and communicate information to support knowledge acquisition in collaborative activities.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling and analyzing these last two components. Topics covered include, but are not limited to: Markov chains and queuing analysis, traffic modeling, interconnection networks and switch architectures and buffering strategies.
Explores the techniques that assist users in obtaining information by harnessing other users' expert knowledge or search experience.
The Social and Cognitive Impacts of E-Commerce on Modern Organizations includes articles addressing the social, cultural, organizational, and cognitive impacts of e-commerce technologies and advances on organizations around the world. Looking specifically at the impacts of electronic commerce on consumer behavior, as well as the impact of e-commerce on organizational behavior, development, and management in organizations. This important new book aims to expand the overall body of knowledge regarding the human aspects of electronic commerce technologies and utilization in modern organizations and to assist researchers and practitioners to devise more effective systems for managing the human side of e-commerce.
An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational outcomes such as, reducing the cost of communication, restructuring how work is performed. However, it has also generated undesirable outcomes, for instance, loss of intellectual property, sexual harassment lawsuits, productivity losses due to surfing usage, security threats, and network bandwidth overload by visiting web sites for travel, leisure, and sports, and news. The mechanisms controlling the interface of individual and institution in this flexible, open, autonomous work environment created by the Web are emergent phenomena, and the lines between legitimate usage and usage are just beginning to be understood. Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management examines topics which embrace a wide array of Personal Web Usage issues such as antecedents of Web usage, frameworks/models of Web usage, Web technologies for monitoring usage, Web usage within other cultures and countries, Measurement issues of Web usage, and the impact of Web usage among others.
Offers access to projects of some of the top professionals working in Real-Time Content Production today like engineering teams from "The Mandalorian" & League of Legends as well as video content designers for The Foo Fighters and Back to the Future, The Musical Includes reviews of real-time content production workflow for virtual production Features discussion from the software developers about the origins of their platforms
I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent
This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.
Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.
Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environment and the importance of protecting the transmission of the licensed users of the spectrum mainly differentiate classical MANETs from CR-MANETs. The cognitive capability and re-configurability of CR-MANETs have opened up several areas of research which have been explored extensively and continue to attract research and development. The book will describe CR-MANETs concepts, intrinsic properties and research challenges of CR-MANETs. Distributed spectrum management functionalities, such as spectrum sensing and sharing, will be presented. The design, optimization and performance evaluation of security issues and upper layers in CR-MANETs, such as transport and application layers, will be investigated.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
The Internet of Things(IoT) is an often-cited topic among researchers and practitioners. This essential book explains the concept and potential that the IoT presents, from mobile applications that allow home appliances to be programmed remotely, to solutions in manufacturing and energy conservation. Coverage features a tutorial for implementing the IoT using IPv6 and Mobile IPv6 and answers critical questions such as what is the IoT, how can it help my organization, what is the cost of deploying this system, and what are the security issues?
Sometimes real life is stranger than fiction. That certainly is the case when considering the things that happen to Khaya Dlanga in the course of his everyday life. Khaya often shares these stories in brief via Instagram or his other social media platforms. He is finally succumbing to the pressure from the many people who read his posts and want more details, and is telling all of these stories and more in These Things Really Do Happen To Me. Always entertaining, and often containing astute observations regarding various social practices and situations, Khaya tells wide-ranging stories – his lunch with William Shatner; how he fell asleep next to President Thabo Mbeki; how he got hit on by a deaf girl; how his dreadlocks didn’t get the expected reaction from his mom; the greatest pick-up line ever used on him; awkward encounters with exes; what happens when you parallel park in Parkhurst; and what he has learnt in the course of his eventful life – that are guaranteed to entertain and enlighten readers.
Details recent research in areas such as ontology design for information integration, metadata generation and management, and representation and management of distributed ontologies. Provides decision support on the use of novel technologies, information about potential problems, and guidelines for the successful application of existing technologies.
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.
This book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: * To introduce the principles of 802.11 wireless networks and show how to con- ure equipment in order to implement various network solutions. * To provide an understandingof the security implicationsof wireless networks and demonstrate how vulnerabilities can be mitigated. * To introduce the underlying 802.11 protocols and build mathematical models in order to analyse performance in a WLAN environment. The book is aimed at industry professionals as well as undergraduate and gra- ate level students. It is intended as a companion for a university course on wireless networking. A practical approach is adopted in this book; examples are provided throughout, supported by detailed instructions. We cover a number of wireless vendors; namely, Cisco's Aironet, Alactel-Lucent's Omniaccess and Meru Networks. While separate vendors, all three systems have a Cisco IOS-like command-line interface. The GNU/Linux operating system is used extensively throughout this book.
Educational informatics represents the convergence of key aspects of information science, computing, and education while exploiting Web-based techniques and standards. This book provides a rigorous definition of and theoretical framework for educational informatics, while relating to the human aspects of educational information systems. Web-Based Learning Through Educational Informatics: Information Science Meets Educational Computing explores the role of information seeking and retrieval in the development of information systems to support personalized and autonomous learning by introducing key concepts from information science.
Austin Sincock provides step-by-step real-world examples for developing Enterprise Java applications on SAP. His is the first title that uses open-source software to help developers learn and use Java for SAP. Bridges the gap between SAP's language ABAP and object-oriented Java Provides a complete look at SAP's Java connector, JCo Demonstrates graphical application development for SAP using Java's Swing libraries Shows how to deploy and build Java applications on the Tomcat Java application server Teaches how to deploy the Java-based HypersonicSQL database, use SQL to populate the database, and tie the external database into an SAP system with Java |
You may like...
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,745
Discovery Miles 37 450
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|