0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (19)
  • R500+ (4,513)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27,... Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

Intelligent Computing, Communication and Devices - Proceedings of ICCD 2014, Volume 2 (Paperback, 2015 ed.): Lakhmi C. Jain,... Intelligent Computing, Communication and Devices - Proceedings of ICCD 2014, Volume 2 (Paperback, 2015 ed.)
Lakhmi C. Jain, Srikanta Patnaik, Nikhil Ichalkaranje
R7,492 Discovery Miles 74 920 Ships in 10 - 15 working days

In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is the next revolution, which the society will perceive in the next 10 years. ICCD-2014 covers all dimensions of intelligent sciences, i.e. Intelligent Computing, Intelligent Communication and Intelligent Devices. This volume covers contributions from Intelligent Communication which are from the areas such as Communications and Wireless Ad Hoc & Sensor Networks, Speech & Natural Language Processing, including Signal, Image and Video Processing and Mobile broadband and Optical networks, which are the key to the ground-breaking inventions to intelligent communication technologies. Secondly, Intelligent Device is any type of equipment, instrument or machine that has its own computing capability. Contributions from the areas such as Embedded Systems, RFID, RF MEMS, VLSI Design & Electronic Devices, Analog and Mixed-Signal IC Design and Testing, MEMS and Microsystems, CMOS MEMS, Solar Cells and Photonics, Nano Devices, Single Electron & Spintronics Devices, Space Electronics and Intelligent Robotics are covered in this volume.

Future Application and Middleware Technology on e-Science (Paperback, 2010 ed.): Ok-Hwan Byeon, Jang-Hyuk Kwon, Thom Dunning,... Future Application and Middleware Technology on e-Science (Paperback, 2010 ed.)
Ok-Hwan Byeon, Jang-Hyuk Kwon, Thom Dunning, Kum Won Cho, Aurore Savoy-Navarro
R4,573 Discovery Miles 45 730 Ships in 10 - 15 working days

Future Application and Middleware Technology on e-Science presents selected papers from the 2008 Korea e-Science All-Hands-Meeting (AHM 2008). Hosted by the Korea Institute of Science and Technology Information, this meeting was designed to bring together developers and users of e-Science applications and enabling information technologies from international and interdisciplinary research communities. The AHM 2008 conference served as a forum for engineers and scientists to present state-of-the-art research and product/tool developments, and to highlight related activities in all fields of e-Science. The works presented in this edited volume bring together cross-disciplinary information on e-Science in one cohesive source. This book is suitable for the professional audience composed of industry researchers and practitioners of e-Science. This volume should also be suitable for advanced-level students in the field.

Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria,... Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings (Paperback, 2014 ed.)
Vijay Atluri, Gunther Pernul
R2,787 Discovery Miles 27 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.

Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15,... Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Paperback, 2014 ed.)
Emmanuel Prouff
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous... Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings (Paperback, 2014 ed.)
Anna Sperotto, Guillaume, Doyen,, Steven Latre, Marinos Charalambides, Burkhard Stiller
R2,183 Discovery Miles 21 830 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and Securing Virtualized Networks and Services, AIMS 2014, held in Brno, Czech Republic, in June/July 2014. The 9 full papers presented were carefully reviewed and selected from 29 submissions. The volume also includes 13 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 27 submissions. The full papers are organized in topical sections on emerging infrastructures for networks and services; experimental studies for security management; and monitoring methods for quality-of-service and security. The workshop papers are organized in topical sections on management of virtualized network resources and functions; security management; SDN and content delivery; monitoring and information sharing.

Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.): Song Y. Yan Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.)
Song Y. Yan
R3,618 Discovery Miles 36 180 Ships in 10 - 15 working days

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Computing and Combinatorics - 20th International Conference, COCOON 2014, Atlanta, GA, USA, August 4-6, 2014, Proceedings... Computing and Combinatorics - 20th International Conference, COCOON 2014, Atlanta, GA, USA, August 4-6, 2014, Proceedings (Paperback, 2014 ed.)
Zhipeng Cai, Alexander Zelikovsky, Anu Bourgeois
R1,723 Discovery Miles 17 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Computing and Combinatorics, COCOON 2014, held in Atlanta, GA, USA, in August 2014. The 51 revised full papers presented were carefully reviewed and selected from 110 submissions. There was a co-organized workshop on computational social networks (CSoNet 2014) where 8 papers were accepted. The papers cover the following topics: sampling and randomized methods; logic, algebra and automata; database and data structures; parameterized complexity and algorithms; computational complexity; computational biology and computational geometry; approximation algorithm; graph theory and algorithms; game theory and cryptography; scheduling algorithms and circuit complexity and CSoNet.

Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimaraes, Portugal, June 30 - July 3,... Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimaraes, Portugal, June 30 - July 3, 204, Proceedings, Part II (Paperback, 2014 ed.)
Beniamino Murgante, Sanjay Misra, Ana Maria Alves Coutinho Rocha, Carmelo Torre, Jorge Gustavo Rocha, …
R1,762 Discovery Miles 17 620 Ships in 10 - 15 working days

The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.

Wireless Coordinated Multicell Systems - Architectures and Precoding Designs (Paperback, 2014): Duy H. N. Nguyen, Tho Le-Ngoc Wireless Coordinated Multicell Systems - Architectures and Precoding Designs (Paperback, 2014)
Duy H. N. Nguyen, Tho Le-Ngoc
R1,929 Discovery Miles 19 290 Ships in 10 - 15 working days

This SpringerBrief discusses the current research on coordinated multipoint transmission/reception (CoMP) in wireless multi-cell systems. This book analyzes the structure of the CoMP precoders and the message exchange mechanism in the CoMP system in order to reveal the advantage of CoMP. Topics include interference management in wireless cellular networks, joint signal processing, interference coordination, uplink and downlink precoding and system models. After an exploration of the motivations and concepts of CoMP, the authors present the architectures of a CoMP system. Practical implementation and operational challenges of CoMP are discussed in detail. Also included is a review of CoMP architectures and deployment scenarios in the LTE-Advanced standard. Readers are exposed to the latest multiuser precoding designs for the CoMP system under two operating modes, interference aware and interference coordination. Wireless Coordinated Multi cell Systems: Architectures and Precoding Designs is a concise and approachable tool for researchers, professionals and advanced-level students interested in wireless communications and networks.

Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014,... Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, Elias Koutsoupias
R3,525 Discovery Miles 35 250 Ships in 10 - 15 working days

This two-volume set of LNCS 8572 and LNCS 8573 constitutes the refereed proceedings of the 41st International Colloquium on Automata, Languages and Programming, ICALP 2014, held in Copenhagen, Denmark, in July 2014. The total of 136 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 484 submissions. The papers are organized in three tracks focussing on Algorithms, Complexity, and Games, Logic, Semantics, Automata, and Theory of Programming, Foundations of Networked Computation.

Job Scheduling Strategies for Parallel Processing - 17th International Workshop, JSSPP 2013, Boston, MA, USA, May 24, 2013... Job Scheduling Strategies for Parallel Processing - 17th International Workshop, JSSPP 2013, Boston, MA, USA, May 24, 2013 Revised Selected Papers (Paperback, 2014 ed.)
Narayan Desai, Walfredo Cirne
R2,171 Discovery Miles 21 710 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2013, held Boston, MA, USA, in May 2013. The 10 revised papers presented were carefully reviewed and selected from 20 submissions. The papers cover the following topics parallel scheduling for commercial environments, scientific computing, supercomputing and cluster platforms.

Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Takayama, Japan, July 23-25,... Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Takayama, Japan, July 23-25, 2014, Proceedings (Paperback, 2014 ed.)
Magnus M. Halldorsson
R2,727 Discovery Miles 27 270 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Colloquium on Structural Information and Communication Complexity, SIROCCO 2014, held in Takayama, Japan, in July 2014. The 24 full papers presented together with 5 invited talks were carefully reviewed and selected from 51 submissions. The focus of the colloquium is on following subjects Shared Memory and Multiparty Communication, Network Optimization, CONGEST Algorithms and Lower Bounds, Wireless networks, Aggregation and Creation Games in Networks, Patrolling and Barrier Coverage, Exploration, Rendevous and Mobile Agents.

Distributed Applications and Interoperable Systems - 14th IFIP WG 6.1 International Conference, DAIS 2014, Held as Part of the... Distributed Applications and Interoperable Systems - 14th IFIP WG 6.1 International Conference, DAIS 2014, Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings (Paperback, 2014 ed.)
Kostas Magoutis, Peter Pietzuch
R2,244 Discovery Miles 22 440 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2014, held in Berlin, Germany, in June 2014. The 12 papers presented in this volume were carefully reviewed and selected from 53 submissions. They deal with cloud computing, replicated storage, and large-scale systems.

Pervasive Computing and the Networked World - Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, December... Pervasive Computing and the Networked World - Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, December 5-7, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Qiaohong Zu, Maria Vargas-Vera, Bo Hu
R1,769 Discovery Miles 17 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Joint International Conference on Pervasive Computing and Web Society, ICPCA/SWS 2013, held in Vina de Mar, Chile, in December 2013. The 56 revised full papers presented together with 29 poster papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on infrastructure and devices; service and solution; data and knowledge; as well as community.

Computers and Games - 8th International Conference, CG 2013, Yokohama, Japan, August 13-15, 2013, Revised Selected Papers... Computers and Games - 8th International Conference, CG 2013, Yokohama, Japan, August 13-15, 2013, Revised Selected Papers (Paperback, 2014 ed.)
H. Jaap van den Herik, Hiroyuki Iida, Aske Plaat
R2,389 Discovery Miles 23 890 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Computers and Games, CG 2013, held in Yokohama, Japan, in August 2013, in conjunction with the 17th Computer and Games Tournament and the 20th World Computer-Chess Championship. The 21 papers presented were carefully reviewed and selected for inclusion in this book. They cover a wide range of topics which are grouped into five classes: Monte Carlo Tree Search and its enhancements; solving and searching; analysis of game characteristic; new approaches; and serious games.

Wireless Rechargeable Sensor Networks (Paperback, 2015 ed.): Yuanyuan Yang, Cong Wang Wireless Rechargeable Sensor Networks (Paperback, 2015 ed.)
Yuanyuan Yang, Cong Wang
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability theory, optimization, algorithm and protocol designs. All proposed mechanisms are evaluated by extensive simulations. Wireless Rechargeable Sensor Networks targets professionals and researchers working in networks, wireless communications, energy technology and information technology. Advanced-level students studying electrical engineering and computer science will also find this material useful as a study guide.

Computer Networks - 21st International Conference, CN 2014, Brunow, Poland, June 23-27, 2014. Proceedings (Paperback, 2014... Computer Networks - 21st International Conference, CN 2014, Brunow, Poland, June 23-27, 2014. Proceedings (Paperback, 2014 ed.)
Andrzej Kwiecien, Piotr Gaj, Piotr Stera
R2,642 Discovery Miles 26 420 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Networks, CN 2014, held in Brunow, Poland, in June 2014. The 34 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, tele informatics and communications, new technologies, queueing theory, innovative applications and networked and IT-related aspects of e-business."

Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015,... Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings (Paperback, 2015 ed.)
Javier Lopez, Yongdong Wu
R3,331 Discovery Miles 33 310 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.): Jie Yang, Yingying Chen, Wade... Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.)
Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng
R1,784 Discovery Miles 17 840 Ships in 10 - 15 working days

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security."

Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014... Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings (Paperback, 2014 ed.)
Song Guo, Jaime Lloret Mauri, Pietro Manzoni, Stefan Ruehrup
R2,981 Discovery Miles 29 810 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Ad-hoc, Mobile and Wireless Networks, ADHOC-NOW 2014, held in Benidorm, Spain, in June 2014. The 33 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers address such diverse topics as routing, cellular networks, MAC and physical layer, mobile ad hoc, sensor and robot networks, localization and security, vehicular ad-hoc networks.

Maritime Wideband Communication Networks - Video Transmission Scheduling (Paperback, 2014 ed.): Tingting Yang, Xuemin (Sherman)... Maritime Wideband Communication Networks - Video Transmission Scheduling (Paperback, 2014 ed.)
Tingting Yang, Xuemin (Sherman) Shen
R1,736 Discovery Miles 17 360 Ships in 10 - 15 working days

This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides valuable insight on the data transmission scheduling and protocol design for the maritime wideband network. This brief begins with an introduction to maritime wideband communication networks including the architecture, framework, operations and a comprehensive survey on current developments. The second part of the brief presents the resource allocation and scheduling for video packet transmission with a goal of maximizing the weights of uploaded video packets. Finally, an energy and content aware scheduling scheme is proposed for the most efficient vessel packet throughput. Based on the real ship route traces obtained from the navigation software BLM-Ship, simulation results demonstrate the viability of the proposed schemes. Conclusions and further research directions are discussed. Maritime Wideband Communication Networks: Video Transmission Scheduling is a valuable tool for researchers and professionals working in wireless communications and networks. Advanced-level students studying computer science and electrical engineering will also find the content valuable.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings (Paperback, 2014 ed.)
Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang
R1,869 Discovery Miles 18 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.

Energy-Efficient Data Centers - Second International Workshop, E(2)DC 2013, Berkeley, CA, USA, May 21, 2013. Revised Selected... Energy-Efficient Data Centers - Second International Workshop, E(2)DC 2013, Berkeley, CA, USA, May 21, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Sonja Klingert, Xavier Hesselbach-Serra, Maria Perez Ortega, Giovanni Giuliani
R1,338 Discovery Miles 13 380 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Energy Efficient Data Centers, E(2)DC 2013, held in Berkeley, CA, USA, in May 2013; co-located with SIGCOMM e-Energy 2013. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on energy and workload measurement; energy management; simulators and control.

Trust and Fairness in Open, Distributed Systems (Paperback, 2010 ed.): Adam Wierzbicki Trust and Fairness in Open, Distributed Systems (Paperback, 2010 ed.)
Adam Wierzbicki
R4,573 Discovery Miles 45 730 Ships in 10 - 15 working days

This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Industrial IoT - Challenges, Design…
Ismail Butun Hardcover R5,025 Discovery Miles 50 250
Big Data in Emergency Management…
Rajendra Akerkar Hardcover R4,668 Discovery Miles 46 680
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, … Hardcover R2,746 Discovery Miles 27 460
Artificial Intelligence Applications and…
Ilias Maglogiannis, Lazaros Iliadis, … Hardcover R1,621 Discovery Miles 16 210
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,316 Discovery Miles 43 160
Learning-Based Reconfigurable Multiple…
Tho Le-Ngoc, Atoosa Dalili Shoaei Hardcover R3,025 Discovery Miles 30 250
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R760 R667 Discovery Miles 6 670
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R5,025 Discovery Miles 50 250
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,612 Discovery Miles 36 120
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R5,058 Discovery Miles 50 580

 

Partners