![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Personal computers
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Computing Systems, UCS 2006, held in Seoul, Korea in October 2006. The 41 revised full papers presented were carefully reviewed and selected from 359 submissions. The papers are organized in topical sections on human computer interaction modeling and social aspects systems communications, as well as smart devices and security.
Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006. The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).
This book constitutes the refereed proceedings of the Second International Workshop on Location- and Context-Awareness, LoCA 2006, held in Dublin, Ireland, in May 2006. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 74 submissions. The papers are organized in topical sections on location sensing, mapping, privacy and access, context sensing, social context, representation and programming.
The Internet has now become an integral part of everyday life for hundreds of millions of people around the world. The uses of the Internet have augmented commerce, communication, education, governance, entertainment, health care, etc. E-mail has become an indispensable part of life; the Web has become an indispensable source of information on just about everything; people now use governmentWebsitestoreceiveinstructionsandinformation, and?lepaperwork with the government; many major online businesses have been created, such as Amazon, eBay, Google, Travelocity, eTrade, etc. However, the uses of the Internet have also had serious negative e?ects, - cluding spam, the spreading of viruses and worms, spyware, phishing, hacking, online fraud, invasions of privacy, etc. Viruses and worms often bring down tens of millions of computers around the world; many people get duped into furni- ing their personal identi?cations, and bank and insurance account information, etc.; hackers break into government and corporation computers to steal cri- cal data; unsubstantiated rumors about individuals or organizations spread like wild?re on the Internet, etc. Further, the uses of the Internet are creating new paradigms in areas such as copyright, governance, etc. The widespread use of peer-to-peer ?le sharing systems, started by Napster, is forcing a reassessment of the value of holding copyright on digital media. Internet postings by vocal citizens to the Web sites of the news media, governmento?ces, and elected g- ernment o?cials are impacting government policies and swaying the opinions of other citizens. The aim of the International Conference on Human
Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."
This book constitutes the refereed proceedings of the International Conference on Embedded and Ubiquitous Computing, EUC 2006, held in Seoul, Korea in August 2006. The 113 revised full papers presented together with 3 keynote articles were carefully reviewed and selected from over 500 submissions. The papers are organized in topical sections on power aware computing, security and fault tolerance, agent and distributed computing, wireless communications, real-time systems, embedded software optimization, embedded systems, multimedia and data management, mobile computing, embedded system design automation, embedded architectures, network protocols, middleware and P2P.
This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, held in Dublin, Ireland, in May 2006. The 24 revised full papers presented here are organized in topical sections on activity recognition, location, sensors, sensor processing and platforms, toolkits and gaming, security, pointing, interaction and displays, and smart homes, and beyond.
Do you want to * Set up an at-home business? * Communicate with others who have already done so? * Learn more about math, science, and history? * Meet people who have the same hobbies as you? * Find out about just about anything? The computer is your link, and media-savvy Mark Bunting promises to show you how. In his witty, adventurous, and incredibly informative style, Bunting gives you the know-how you need to use your computer as your partner in any project you undertake. After all, your computer is not merely an expensive machine bought for typing letters; it can become the most extraordinary tool at your disposal because it enables you to build, fix, or create whatever your want. Mark Bunting, the Bob Vila of the cyberworld, will dramatically change your relationship with your personal computer. He will help you realize a life of increased freedom and success -- the life of your dreams -- with your computer.
IT CAN'T CRASH, IT WON'T PUT YOU ON HOLD, AND IT NEVER TAKES LUNCH BREAKS.
If you've ever used a personal computer (and who hasn't), you know what these moments are like. Fear and frustration overwhelm you. You call every computer-savvy person you know, hoping that someone will provide the magic solution to save your document, your deadline, your job. Now, saving the day for thousands of PC and Mac users alike, comes The Geek Squad Guide to Solving Any Computer Glitch. You're not a dummy or an idiot, but you do need help. In plain English and with a humorous flair, The Geek Squad Guide demystifies the most widely used hardware and software, offers quick fixes to common glitches, and provides smart maintenance advice to keep things running smoothly. THE GEEKS WILL HELP YOU:
Welcome to the proceedings of UbiComp 2004. In recent years the ubiquitous computing community has witnessed a sign- cant growth in the number of conferences in the area, each with its own disti- tive characteristics. For UbiComp these characteristics have always included a high-quality technical program and associated demonstrations and posters that cover the full range of research being carried out under the umbrella of ubiq- tous computing. Ours is a broaddiscipline andUbiComp aims to be aninclusive forum that welcomes submissions from researchers with many di?erent ba- grounds. This year we received 145 submissions. Of these we accepted 26, an acceptance rate of just under 18%. Of course acceptance rate is simply a m- sure of selectivity rather than quality and we were particularly pleased this year to note that we had a large number of high-quality submissions from which to assemble the program for 2004. The broad nature of ubiquitous computing research makes reviewing Ubi- Comp submissions a particular challenge. This year we adopted a new process for review and selection that has, we hope, resulted in all authors obtaining - tremely detailed feedback on their submission whether or not it was accepted for publication. We believe the process enabled us to assemble the best pos- ble program for delegates at the conference. If you submitted a paper, we hope that you bene?ted from the feedback that your peers have provided, and if you attended UbiComp 2004 we hope that you enjoyed the technical program.
The Information Society is bringing about radical changes in the way people work and interact with each other and with information. In contrast to previous information processing paradigms, where the vast majority of computer-mediated tasks were business-oriented and executed by office workers using the personal computer in its various forms (i. e. , initially alphanumeric terminals and later on graphical user interfaces), the Information Society signifies a growth not only in the range and scope of the tasks, but also in the way in which they are carried out and experienced. To address the resulting dimensions of diversity, the notion of universal access is critically important. Universal access implies the accessibility and usability of Information Society technologies by anyone, anywhere, anytime. Universal access aims to enable equitable access and active participation of potentially all citizens in existing and emerging computer-mediated human activities by developing universally accessible and usable products and services, which are capable of accommodating individual user requirements in different contexts of use and independently of location, target machine, or run-time environment. In the context of the emerging Information Society, universal access becomes predominantly an issue of design, pointing to the compelling need for devising systematic and cost-effective approaches to designing systems that accommodate the requirements of the widest possible range of end-users. Recent developments have emphasized the need to consolidate progress by means of establishing a common vocabulary and a code of design practice, which addresses the specific challenges posed by universal access.
Here is a one-volume guide to just about everything computer-related for amateur astronomers Today's amateur astronomy is inextricably linked to personal computers. Computer-controlled "go-to" telescopes are inexpensive. CCD and webcam imaging make intensive use of the technology for capturing and processing images. Planetarium software provides information and an easy interface for telescopes. The Internet offers links to other astronomers, information, and software. The list goes on and on. Find out here how to choose the best planetarium program: are commercial versions really better than freeware? Learn how to optimise a go-to telescope, or connect it to a lap-top. Discover how to choose the best webcam and use it with your telescope. Create a mosaic of the Moon, or high-resolution images of the planets... Astronomy with a Home Computer is designed for every amateur astronomer who owns a home computer, whether it is running Microsoft Windows, Mac O/S or Linux. It doesn't matter what kind of telescope you own either - a small refractor is just as useful as a big "go-to" SCT for most of the projects in this book.
Twenty years ago, informatics was introduced as a compulsory subject in A- trian secondary schools. During this period informatics has experienced drastic evolutions and even some shifts of paradigms. This applies to an even larger extent to the didactics of informatics. ISSEP-InformaticsinSecondarySchools,EvolutionandPerspectives-takes stock of how the developments in the ?eld are re?ected in school throughout Europe. Teachersofinformaticsatsecondaryschoolsaswellaseducatorsofsuch teachers propose innovative methods of instruction, discuss the scope of overall informaticsinstruction,anddiscusshowinnovativeconceptscanbedisseminated to students in education as well as to active informatics teachers. Duetothepenetrationofinformationtechnologyintosocietyatlargeandinto schools in particular, the relationship between informatics and education leading togeneralcomputerliteracyortotheuseofIT-basedapproachesinconventional subjects, e-learning in school, is an evident focus of many contributions. According to the broad scope of the conference its proceedings are split into two volumes. This volume, From Computer Literacy to Informatics Fundam- tals, covers papers reporting on national strategies of informatics instruction and their evolution in accordance with the penetration of information proce- ing equipment in our daily life. In one way or another, these strategies strive to accommodate the needs of basic skills in information and communication te- nology (ICT) with educational principles that can be conveyed by informatics instruction in a traditional sense. Hence, the papers on national strategies are complementedintwoways:?rstly,bycontributionsthatstrivetoidentifyfun- mental issues, informatics can contribute to the general education process of the youth; and, secondly, by papers presenting approaches on how to link or even to combine instruction about such informatics fundamentals with the need to introduce pupils to the productive use of ICT.
Context-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context retrieval approaches are key p- requisites in any context-aware system. Location is one of the primary aspects of all major context models - together with time, identity and activity. From the technical side, sensing, fusing and distributing location and other context information is as important as providing context-awareness to applications and services in pervasive systems. Thematerialsummarizedinthisvolumewasselectedforthe1stInternational Workshop on Location- and Context-Awareness (LoCA 2005) held in coope- tion with the 3rd International Conference on Pervasive Computing 2005. The workshop was organized by the Institute of Communications and Navigation of the German Aerospace Center (DLR) in Oberpfa?enhofen, and the Mobile and Distributed Systems Group of the University of Munich. During the workshop, novel positioning algorithms and location sensing te- niques were discussed, comprising not only enhancements of singular systems, like positioning in GSM or WLAN, but also hybrid technologies, such as the integration of global satellite systems with inertial positioning. Furthermore, - provements in sensor technology, as well as the integration and fusion of sensors, were addressed both on a theoretical and on an implementation level. Personal and con?dential data, such as location data of users, have p- found implications for personal information privacy. Thus privacy protection, privacy-oriented location-aware systems, and how privacy a?ects the feasibility and usefulness of systems were also addressed in the workshop.
UbiComp 2003, the 5th Annual Conference on Ubiquitous Computing, is the premier forum for presentation of research results in all areas relating to the - sign, implementation, deployment and evaluation of ubiquitous computing te- nologies. The conference brings together leading researchers, from a variety of disciplines, perspectives and geographical areas, who are exploring the impli- tions of computing as it moves beyond the desktop and becomes increasingly interwoven into the fabrics of our lives. This volume, the conference proceedings, contains the entire collection of high-quality full papers and technical notes from UbiComp 2003. There were 16 full papers in this year's conference, selected by our international program committee from among 117 submissions. There were also 11 technical notes in the program: 8 taken from the 36 technical note submissions, and 3 that were adapted from full paper submissions. We are very grateful to Tim Kindberg and Bernt Schiele, our Technical Notes Co-chairs, and to all the authors and reviewers of both papers and technical notes who contributed to maintaining the high standards of quality for the conference. In addition to the full papers and technical notes, UbiComp 2003 also p- vided a number of other participation categories, including workshops, dem- strations, interactive posters, a panel, a doctoral colloquium and a video p- gram. While accepted submissions in these categories were also of high quality, timing and size constraints prevented us from including them in this volume.
This book constitutes the refereed proceedings of the First International Conference on Pervasive Computing, Pervasive 2002, held in Zürich, Switzerland in August 2002.The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 162 submissions. The papers are organized in topical sections on system design; applications; identification and authentication; models, platforms, and architectures; location and mobility; and device independence and content distribution.
This book constitutes the refereed proceedings of the Third International Conference on Ubiquitous Computing, Ubicomp 2001, held in Atlanta, GA, USA in September/October 2001. The 14 revised full papers and 15 revised technical notes were carefully selected during a highly competitive reviewing process from a total of 160 submissions (90 paper submissions and 70 technical notes submissions). All current aspects of research and development in the booming area of ubiquitous computing are addressed. The book offers topical sections on location awareness, tools and infrastructure, applications for groups, applications and design spaces, research challenges and novel input, and output.
This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Computing, UbiComp 2002, held in Göteborg, Sweden in September/October 2002.The 15 revised full papers and 14 technical notes presented were carefully reviewed and selected from a total of 195 submissions. The book offers topical sections on mobile and context-aware systems, user studies and design, perceptual interfaces and responsive environments, sharing and accessing information - public and private, location, and sensors and applications.
The Pocket PC is the fastest growing platform for building handheld-based enterprise applications. Free from the memory limitations and underpowered processors of other handheld platforms, Pocket Access and eMbedded Visual Basic are providing the Pocket PC with the same one-two punch that Microsoft Access and Visual Basic gave Windows application development in the early 1990s. As the first rapid application development tool for the Pocket PC, eMbedded Visual Basic increases developer productivity and allows for the creation of a wide range of database applications to empower an increasingly mobile workforce. This is the first book on the market to focus on Pocket PC development using Microsoft's free eMbedded Visual Basic 3.0. "Pocket PC Database Development with eMbedded Visual Basic" is designed to get software developers up to speed building Pocket Access database applications using eMbedded Visual Basic on the Pocket PC. Author Rob Tiffany has put his own Visual Basic background to work in developing advanced Pocket PC applications for large energy companies. It's from this perspective that he guides professional Visual Basic and Access programmers into the world of Pocket PC software development. This book ramps up your skills in fast-paced but pragmatic fashion. After describing the subset of the SQL language that Pocket PC developers need to know, the author guides you through Microsoft's ADOCE and ActiveSync technologies with no-nonsense examples. Tiffany effectively shares his "been there, done that" experience to help programmers avoid the shoals can sink efforts to build Pocket PC applications that communicate with either local Pocket Access databases or remote SQL Server databases.
This book constitutes the refereed proceedings of the Second International Symposium on Handheld and Ubiquitous Computing, HUC 2000, held in Bristol, UK in September 2000. The 18 revised full papers presented were carefully reviewed and selected from 70 submissions. The book offers topical sections on intelligent environments, user experience, multimedia augmentation, location-based services, context-aware messaging, intelligent devices, infrastructure engineering, and wearable computing.
If you've dreamed about having a customized multimedia PC or one tricked out for your favorite games, build your own and make your dreams come true! Build Your Own PC Do-It-Yourself For Dummies makes it easy. Not only is building your own PC a really rewarding project, it can also save you a nice chunk of cash. This step-by-step guide helps you decide what you need, teaches you what all those computer terms mean, and tells you exactly how to put the pieces together. It shows you: What tools you need (not as many as you might think!) All about operating systems How to install CD and DVD drives The scoop on sound and video, and how to put a sound system together from start to finish How to connect a monitor and install a modem All about setting up and configuring the hard drive Secrets for securing your system, and more Included is a bonus DVD showing you how to install the motherboard, CPU, RAM, ports, hard drive, video and sound cards, a DVD drive, and more. With Build Your Own PC Do-It-Yourself For Dummies, you can have the computer you want plus the satisfaction of doing it yourself! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
"Bootstrapping" analyzes the genesis of personal computing from
both technological and social perspectives, through a close study
of the pathbreaking work of one researcher, Douglas Engelbart. In
his lab at the Stanford Research Institute in the 1960s, Engelbart,
along with a small team of researchers, developed some of the
cornerstones of personal computing as we know it, including the
mouse, the windowed user interface, and hypertext. Today, all these
technologies are well known, even taken for granted, but the
assumptions and motivations behind their invention are not.
"Bootstrapping" establishes Douglas Engelbart's contribution
through a detailed history of both the material and the symbolic
constitution of his system's human-computer interface in the
context of the computer research community in the United States in
the 1960s and 1970s.
The FM 8501 microprocessor was invented as a generic microprocessor
somewhat similar to a PDP-11. The principal idea of the FM 8501
effort was to see if it was possible to express the user-level
specification and the design implementation using a formal logic,
the Boyer-Moore logic; this approach permitted a complete
mechanically checked proof that the FM 8501 implementation fully
implemented its specification. The implementation model for the FM
8501 was inadequate for industrial hardware design but the effort
was an important step in the evolution to the design verification
methodology now employed by the author.
Dynamic Modeling introduces an approach to modeling that makes it a more practical, intuitive endeavour. The book enables readers to convert their understanding of a phenomenon to a computer model, and then to run the model and let it yield the inevitable dynamic consequences built into the structure of the model. Part I provides an introduction to modeling dynamic systems, while Part II offers general methods for modeling. Parts III through to VIII then apply these methods to model real-world phenomena from chemistry, genetics, ecology, economics, and engineering. To develop and execute dynamic simulation models, Dynamic Modeling comes with STELLA II run- time software for Windows-based computers, as well as computer files of sample models used in the book. A clear, approachable introduction to the modeling process, of interest in any field where real problems can be illuminated by computer simulation.
Auf einen Rechner ein informationsverarbeitendes System aus Hardware und Software sollte Verlass sein. Das ist eine Anforderung, die in der Praxis oft nur mit sehr grossem Aufwand oder in unbefriedigendem Masse zu erfullen ist. "Test von Rechnern" vermittelt einen umfassenden Uberblick uber die Probleme und Massnahmen, mit denen die Verlasslichkeit informationsverarbeitender Systeme gesichert wird. Grosser Wert wurde auf abschatzbare Kenngrossen und anschauliche Experimente fur ihre Abschatzung gelegt. Da die Systeme immer grosser werden und es immer schwieriger wird, sie von aussen ausreichend grundlich zu testen, wird im abschliessenden Kapitel das Thema Selbsttest ausfuhrlich behandelt. Test und Verlasslichkeit ist ein Lehrbuch fur Studierende der Fachrichtungen Informatik, Informationstechnik in hoheren Semestern. Praktiker aus den Bereichen Entwicklung, Test und Qualitatssicherung werden in dem Buch zahlreiche interessante Anregungen finden." |
You may like...
RISC System/6000 PowerPC System…
International Business Machines Inc
Hardcover
R1,222
Discovery Miles 12 220
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,285
Discovery Miles 12 850
|