Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book constitutes the refereed proceedings of the 7th International Conference on E-Technologies, MCETECH 2017, held in Ottawa, ON, Canada, in May 2017. This year's conference drew special attention to the ever-increasing role of the Internet of Things (IoT); and the contributions span a variety of application domains such as e-Commerce, e-Health, e-Learning, and e-Justice, comprising research from models and architectures, methodology proposals, prototype implementations, and empirical validation of theoretical models. The 19 papers presented were carefully reviewed and selected from 48 submissions. They were organized in topical sections named: pervasive computing and smart applications; security, privacy and trust; process modeling and adaptation; data analytics and machine learning; and e-health and e-commerce.
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers.
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021. The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design. Chapters "A Quantile-based Watermarking Approach for Distortion Minimization", "Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach" and "A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
The9thInternationalConferenceonIntelligentTutoringSystems(ITS2008)was heldJune 23-27,2008inMontreal. Thisyearwecelebratedthe 20thanniversary ofthe conferencefounded in 1988in Montreal. We havehadbiennial conferences for most of the past 10 years around the world, including in Brazil, Taiwan, France, Canada, and the USA. These ITS conferences provide a forum for the interchange of ideas in all areas of computer science and human learning, a unique environment to exchange ideas and support new developments relevant for the future. The 2008 conference was a symbolic milestone that enabled us to look back at what has been achieved and what is currently being done, in order to face the challenges of tomorrow. Much has changed in the last 20 years in terms of hardware, software, p- grammers, and education stakeholders. Technology is now networked, pervasive, and availableanyplace and anytime. The potential exists to provide customized, ubiquitous guidance andinstruction. However, much has remainedthe same and the need is just as great to model the learner, teaching strategies and domain knowledge. This year we saw an increase in research into student a?ect (mo- vation, boredom, and frustration), speci?cally attempts to detect student a?ect, while feedback studies consideredwhich responses to provide given both student cognition and a?ect. Studies also looked at the impact on learning of positive feedbackandpolitenessinfeedback. Newresearchwasseenindataminingbased on larger studies that use data from real students to diagnose e?ective learning and teaching. So much interest has been generated in this area that the ?rst International Conference on Educational Data Mining was co-located with ITS 200
|
You may like...
Loss - Poems To Better Weather The Many…
Donna Ashworth
Hardcover
(1)
|