![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.
Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense. ""Human Computer Interaction Research in Web Design and Evaluation"" is a comprehensive book on HCI and Web design that focuses on various areas of research including theories, analysis, design, and evaluation. This book not only features the human aspect of Web design, but also highlights the social and cultural issues in designing for a wider audience.
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
Facebook had a problem. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world, extolling its products for connecting people. But as a succession of scandals rocked Facebook from 2016, some began to question whether the company could control, or even understood, its own platforms. As Facebook employees searched for answers, what they uncovered was worse than they could've imagined. The problems ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians and allowing VIP users to break the platform's supposedly inviolable rules. It turned out to be eminently possible to isolate many of Facebook's worst problems, but whenever employees offered solutions their work was consistently delayed, watered down or stifled by a company that valued user engagement above all else. The only option left was to blow the whistle. In Broken Code, award-winning Wall Street Journal reporter Jeff Horwitz tells the riveting inside story of these employees and their explosive discoveries, uncovering the shocking cost of Facebook's blind ambition in the process.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
In practice, the design and architecture of a cloud varies among cloud providers. We present a generic evaluation framework for the performance, availability and reliability characteristics of various cloud platforms. We describe a generic benchmark architecture for cloud databases, specifically NoSQL database as a service. It measures the performance of replication delay and monetary cost. Service Level Agreements (SLA) represent the contract which captures the agreed upon guarantees between a service provider and its customers. The specifications of existing service level agreements (SLA) for cloud services are not designed to flexibly handle even relatively straightforward performance and technical requirements of consumer applications. We present a novel approach for SLA-based management of cloud-hosted databases from the consumer perspective and an end-to-end framework for consumer-centric SLA management of cloud-hosted databases. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the monetary cost of the allocated computing resources. In this framework, the SLA of the consumer applications are declaratively defined in terms of goals which are subjected to a number of constraints that are specific to the application requirements. The framework continuously monitors the application-defined SLA and automatically triggers the execution of necessary corrective actions (scaling out/in the database tier) when required. The framework is database platform-agnostic, uses virtualization-based database replication mechanisms and requires zero source code changes of the cloud-hosted software applications.
The main purpose of this book is to sum up the vital and highly topical research issue of knowledge representation on the Web and to discuss novel solutions by combining benefits of folksonomies and Web 2.0 approaches with ontologies and semantic technologies. The book contains an overview of knowledge representation approaches in past, present and future, introduction to ontologies, Web indexing and in first case the novel approaches of developing ontologies. combines aspects of knowledge representation for both the Semantic Web (ontologies) and the Web 2.0 (folksonomies). Currently there is no monographic book which provides a combined overview over these topics. focus on the topic of using knowledge representation methods for document indexing purposes. For this purpose, considerations from classical librarian interests in knowledge representation (thesauri, classification schemes etc.) are included, which are not part of most other books which have a stronger background in computer science.
The 2008 TUB-SJTU joint workshop on Autonomous Systems Self-Organization, Management, and Control was held on October 6, 2008 at Shanghai Jiao Tong University, Shanghai, China. The workshop, sponsored by Shanghai Jiao Tong University and Technical University of Berlin brought together scientists and researchers from both universities to present and discuss the latest progress on autonomous systems and its applications in diverse areas. Autonomous systems are designed to integrate machines, computing, sensing, and software to create intelligent systems capable of interacting with the complexities of the real world. Autonomous systems represent the physical embodiment of machine intelligence. Topics of interest include, but are not limited to theory and modeling for autonomous systems; organization of autonomous systems; learning and perception; complex systems; multi-agent systems; robotics and control; applications of autonomous systems.
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.
This book is the second installment of a two-volume series on IPv6
and the KAME implementation. This book discusses those protocols
that are found in more capable IPv6 devices, are commonly deployed
in more complex IPv6 network environments, or are not specific to
IPv6 but are extended to support IPv6. Specifically, this book
engages the readers in advanced topics such as routing,
multicasting, DNS, DHCPv6, mobility, and security.
The Semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive and transportable machine understanding. ""Semantic Web Services: Theory, Tools and Applications"" brings contributions from researchers, scientists from both industry and academia, and representatives from different communities to study, understand, and explore the theory, tools, and applications of the Semantic Web. ""Semantic Web Services: Theory, Tools and Applications"" binds computing involving the Semantic Web, ontologies, knowledge management, Web services, and Web processes into one fully comprehensive resource, serving as the platform for exchange of both practical technologies and far reaching research.
The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.
Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the infrastructure. Terminological Ontologies: Design, Management and Practical Applications presents the main problems that affect the discovery systems of information infrastructures to manage terminological models, and introduces a combination of research tools and applications in Semantic Web technologies. This book specifically analyzes the need to create, relate, and integrate the models required for an infrastructure by elaborating on the problem of accessing these models in an efficient manner via interoperable services and components. Terminological Ontologies: Design, Management and Practical Applications is geared toward information management systems and semantic web professionals working as project managers, application developers, government workers and more. Advanced undergraduate and graduate level students, professors and researchers focusing on computer science will also find this book valuable as a secondary text or reference book.
In this volume, Rudi Studer and his team deliver a self-contained compendium about the exciting field of Semantic Web services, starting with the basic standards and technologies and also including advanced applications in eGovernment and eHealth. The contributions provide both the theoretical background and the practical knowledge necessary to understand the essential ideas and to design new cutting-edge applications.
In the early days of the Web a need was recognized for a language
to display 3D objects through a browser. An HTML-like language,
VRML, was proposed in 1994 and became the standard for describing
interactive 3D objects and worlds on the Web. 3D Web courses were
started, several best-selling books were published, and VRML
continues to be used today. However VRML, because it was based on
HTML, is a stodgy language that is not easy to incorporate with
other applications and has been difficult to add features to.
Meanwhile, applications for interactive 3D graphics have been
exploding in areas such as medicine, science, industry, and
entertainment. There is a strong need for a set of modern Web-based
technologies, applied within a standard extensible framework, to
enable a new generation of modeling & simulation applications
to emerge, develop, and interoperate. X3D is the next generation
open standard for 3D on the web. It is the result of several years
of development by the Web 3D Consortium's X3D Task Group. Instead
of a large monolithic specification (like VRML), which requires
full adoption for compliance, X3D is a component-based architecture
that can support applications ranging from a simple non-interactive
animation to the latest streaming or rendering applications. X3D
replaces VRML, but also provides compatibility with existing VRML
content and browsers. Don Brutzman organized the first symposium on
VRML and is playing a similar role with X3D; he is a founding
member of the consortium. Len Daly is a professional member of the
consortium and both Len and Don have been involved with the
development of the standard from the start.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
As an important future network architecture, virtual network architecture has received extensive attention. Virtual network embedding (VNE) is one of the core services of network virtualization (NV). It provides solutions for various network applications from the perspective of virtual network resource allocation. The Internet aims to provide global users with comprehensive coverage. The network function requests of hundreds of millions of end users have brought great pressure to the underlying network architecture. VNE algorithm can provide effective support for the reasonable and efficient allocation of network resources, so as to alleviate the pressure off the Internet. At present, a distinctive feature of the Internet environment is that the quality of service (QoS) requirements of users are differentiated. Different regions, different times, and different users have different network function requirements. Therefore, network resources need to be reasonably allocated according to users' QoS requirements to avoid the waste of network resources. In this book, based on the analysis of the principle of VNE algorithm, we provide a VNE scheme for users with differentiated QoS requirements. We summarize the common user requirements into four categories: security awareness, service awareness, energy awareness, and load balance, and then introduce the specific implementation methods of various differentiated QoS algorithms. This book provides a variety of VNE solutions, including VNE algorithms for single physical domain, VNE algorithms for across multiple physical domains, VNE algorithms based on heuristic method, and VNE algorithms based on machine learning method.
The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.
Visual Knowledge Modeling for Semantic Web Technologies: Models and Ontologies aims to make visual knowledge modeling available to individuals as an intellectual method and a set of tools at different levels of formalization. It aims to provide to its readers a simple, yet powerful visual language to structure their thoughts, analyze information, transform it to personal knowledge, and communicate information to support knowledge acquisition in collaborative activities.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
The Social and Cognitive Impacts of E-Commerce on Modern Organizations includes articles addressing the social, cultural, organizational, and cognitive impacts of e-commerce technologies and advances on organizations around the world. Looking specifically at the impacts of electronic commerce on consumer behavior, as well as the impact of e-commerce on organizational behavior, development, and management in organizations. This important new book aims to expand the overall body of knowledge regarding the human aspects of electronic commerce technologies and utilization in modern organizations and to assist researchers and practitioners to devise more effective systems for managing the human side of e-commerce. |
![]() ![]() You may like...
Design Thinking for School Leaders…
Alyssa Gallagher, Kami Thordarson
Paperback
Kinetic Boltzmann, Vlasov and Related…
Alexander Sinitsyn, Eugene Dulov, …
Paperback
Modeling and Nonlinear Robust Control of…
Jonatan Martin Escorcia Hernandez, Ahmed Chemori, …
Paperback
R2,929
Discovery Miles 29 290
Software Services for e-World - 10th…
Wojciech Cellary, Elsa Estevez
Hardcover
R1,559
Discovery Miles 15 590
|