If you are an Android developer who wants to learn how to use UDOO to build Android applications that are capable of interacting with their surrounding environment, then this book is ideal for you. Learning UDOO is the next great step to start building your first real-world prototypes powered by the Android operating system.
Applied Cryptography and Network Security (Lecture Notes in Computer Science, #3089) (Security and Cryptology, #5037)
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8-11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in re...
End-User Computing, Development, and Software Engineering: New Challenges explores the implementation of organizational and end user computing initiatives and provides foundational research to further the understanding of this discipline and its related fields. This book reviews the factors and barriers to ICT adoption in organizations, opportunities and benefits of communities of practice, and impact that end user computing can have on overall firm performance.
Advances in Cognitive Ergonomics (Advances in Human Factors and Ergonomics, #4)
The chapters in the book come from an international group of authors with diverse backgrounds including ergonomics, psychology, architecture, computer science, engineering, and sociology. Specific topics include biometric systems development, military command and control, cellular phone interface design, methodologies for workplace design, medical device design, cockpit display and decision tool design for pilots, driver visual and cognitive processes, and performance of inspection tasks in manu...
Virtual Reality
In a series of case studies of actual research in virtual environments internationally, the author surveys the current state of applied virtual reality. Projects in medical research, collaborative writing, education and training, aerospace, architecture, and other sciences are examined with an emphasis on extracting techniques and development strategies applicable to a wide variety of research disciplines.
"The finest book on video games yet. Simon Parkin thinks like a critic, conjures like a novelist, and writes like an artist at the height of his powers—which, in fact, he is." —Tom Bissell, author of Extra Lives: Why Video Games Matter On January 31, 2012, a twenty-three-year-old student was found dead at his keyboard in an internet café while the video game he had been playing for three days straight continued to flash on the screen in front of him. Trying to reconstruct what had happened th...
Simulating Humans
by Norman I. Badler, Cary B. Phillips, and Bonnie Lynn Webber
Though actively pursued by several research groups, the problem of providing a synthetic or surrogate human for an engineer or designer already used to Computer Aided Design techniques has been most comprehensively solved by Norman Badler's computer graphics laboratory at the University of Pennsylvania - one of the world leaders in the field of simulated human figures in computer graphics. For human factors engineers, this book provides current knowledge of how a computer graphics surrogate hum...
Working Together Apart (Synthesis Lectures on Human-Centered Informatics)
by Judy S. Olson and Gary Olson
Increasingly, teams are working together when they are not in the same location, even though there are many challenges to doing so successfully. Here we review the latest insights into these matters, guided by a framework that we have developed during two decades of research on this topic. This framework organizes a series of factors that we have found to differentiate between successful and unsuccessful distributed collaborations. We then review the kinds of technology options that are availab...
E-government has become a global phenomenon through its use of Internet technologies as a platform for exchanging information, providing services, and transacting with citizens, businesses, and other arms of government. E-Government Development and Diffusion: Inhibitors and Facilitators of Digital Democracy provides a comprehensive, integrative, and global assessment of the e-government evolution in terms of real-life success and failure cases. Containing research from leading international expe...
The area of intelligent and adaptive user interfaces has been of interest to the research community for a long time. Much effort has been spent in trying to find a stable theoretical base for adaptivity in human-computer interaction and to build prototypical systems showing features of adaptivity in real-life interfaces. To date research in this field has not led to a coherent view of problems, let alone solutions. A workshop was organized, which brought together a number of well-known researche...
Digital libraries (DLs) have introduced new technologies, as well as leveraging, enhancing, and integrating related technologies, since the early 1990s. These efforts have been enriched through a formal approach, e.g., the 5S (Societies, Scenarios, Spaces, Structures, Streams) framework, which is discussed in two earlier volumes in this series. This volume should help advance work not only in DLs, but also in the WWW and other information systems. Drawing upon four (Kozievitch, Murthy, Park, Ya...
Multitasking in the Digital Age (Synthesis Lectures on Human-Centered Informatics)
by Gloria Mark
In our digital age we can communicate, access, create, and share an abundance of information effortlessly, rapidly, and nearly ubiquitously. The consequence of having so many choices is that they compete for our attention: we continually switch our attention between different types of information while doing different types of tasks--in other words, we multitask. The activity of information workers in particular is characterized by the continual switching of attention throughout the day. In this...
Arguing that one way of understanding cyberspace is as an attempt to realize an electronic version of heaven, this book begins with the medieval definition of the world as spiritual space. The author traces the emergence of modern physics with its emphasis on physical space, and then presents her thesis: that cyberspace, an outgrowth of modern science, nevertheless represents a return to medieval, spiritual concerns. Cyberspace posits the existence of a genuine yet immaterial world in which peop...
Enhancing Learning Through Human Computer Interaction
Enhancing Learning Through Human Computer Interaction is an excellent reference source of Human Computer Interaction (HCI) applications and designs. This premier reference source provides a complete analysis of online business training programs and e-learning in the higher education sector. It describes a range of positive outcomes for linking information management techniques, which exploit the educational benefits of Web-mediated learning in computer-supported collaborative learning. Case stud...
Emerging Pervasive and Ubiquitous Aspects of Information Systems: Cross-Disciplinary Advancements
Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds. However, many cybersecurity researchers have come to realize that to...
Gestensteuerung zur Optimierung der Informationsprozesse (Autouni - Schriftenreihe, #92)
by Anna-Charlotte Fleischmann
Anna-Charlotte Fleischmann befasst sich damit, wie moderne Technologien die Zusammenarbeit zwischen Planung und Shopfloor unterstutzen koennen. Durch neuartige Bedienmoeglichkeiten wie der Gestensteuerung sollen komplexe Planungssysteme intuitiv gestaltet werden, um Mitarbeiter der direkten Bereiche fruhzeitig in die Planung miteinzubeziehen. Die Autorin nutzt verschiedene Ansatze zur Entwicklung von Gesten und sichert diese international ab. Das Ergebnis ist MoviA - die 'Mobile virtuelle Absich...
The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique t...
Computer Science Student ... Sticks and Stones May Break My Bones But Spreadsheets Will Never Hurt Me
by Studygo Official
Sustainable Language Support Practices in Science Education: Technologies and Solutions presents cases on the results of a study done in Australia on first-year university students and the impact of new techniques of language acquisition on science education. The project covered biology, chemistry and physics. Nearly 3,400 students were involved in the project, drawn from the University of Canberra, the University of Technology, Sydney, the University of Sydney, the University of Tasmania and th...
This book constitutes the refereed proceedings of the Third International Conference on Advanced Data Mining and Applications, ADMA 2007, held in Harbin, China in August 2007. The papers focus on advancements in data mining and peculiarities and challenges of real world applications using data mining.