Formal Techniques for Computer Systems and Business Processes (Lecture Notes in Computer Science, #3670)
by Mario Bravetti
Computing in the Information Age / Wackerly Lab Intro CIS
by Nancy B. Stern
This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: privacy; and audit, compliance and threat intelligence.The chapter "A data utility-driven benchmark for de-identification methods" i...
A Computer for Each Student
Since the use of computers is expanding so rapidly, it is expected that five years from now 70 to 80 percent of students will have their own personal computer. This clearly will have an impact on teaching and the curriculum in most subjects. The purpose of this conference was to determine and evaluate this impact. Changes in traditional classroom teaching and examinations in areas such as Science and Engineering, Medical Science, Library and Information Science, the Management Sciences, and othe...
Blockchain technology, one of the most buzzed-about yet least understood technological innovations of recent years, is at a point similar to where the Internet was in the mid-1990s or peer-to-peer file-sharing services were in the late 1990s: ready for takeoff. The Economist has cited blockchain s extraordinary potential in business, since it enables people who have no particular confidence in each other to collaborate without having to go through a neutral central authority. Simply put, blockch...
This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics. Reflecting the organiz...
Cyberculture is a particularly complex issue. It is seen as a fantastic meeting point of classic philosophers with postmodern theorists, politicians with community engineers, contemporary sophists with software engineers, and artists with rhetoricians. Today, cyberculture is identified highly with new media and digital rhetoric and could be used to create a comprehensive map of modern culture. Present and Future Paradigms of Cyberculture in the 21st Century is a comprehensive research publicatio...
Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software - and to hacking as a technical, aesthetic, and moral project - reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software (F/OSS) movement in the United States and Europe, "Coding Freedom" details the ethics behind hackers' devotion to F/OSS, the social codes that guide...
Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia. The KES conference series has been established for almost a decade, and it cont- ues each year to attract participants from all geographical areas of the world, including Europe, the Americas, Australasia and the Paci?c Rim. The KES conferences cove...
Agent Mediated Electronic Commerce (Lecture Notes in Computer Science, #1991) (Lecture Notes in Artificial Intelligence, #1991)
Electronic Commerce, as a gamut of activities involving electronic transactions performed over a network via software that may be more or less autonomous, is an emerging reality. Strategic studies have shown that electronic commerce is a major growth industry. The book is devoted to the challenges and opportunities that electronic commerce opens for agent technology. For some time, electronic commerce has attracted the avid attention of agent-builders and agent technology researchers, and these...
It happens in America every four decades and it is about to happen again. America's demand for change in the 2008 election will cause another of our country's periodic political makeovers. This realignment, like all others before it, will result from the coming of age of a new generation of young Americans - the Millennial Generation - and the full emergence of the Internet-based communications technology that this generation uses so well. Beginning in 2008, almost everything about American poli...
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencie...
User Modeling 2005 (Lecture Notes in Computer Science, #3538) (Lecture Notes in Artificial Intelligence, #3538)
by Liliana Ardissono
The 33 revised full papers and 30 poster summaries presented together with papers of 12 selected doctoral consortium articles and the abstracts of 3 invited lectures were carefully reviewed and selected from 160 submissions. The book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ITS and adaptive advice, modeling and recognizing human activity, multimodality and ubiquitous computing, recommender systems, student mod...
This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror. It identifies the threats, the security needs, and the issues unique to this environment. The book examines whether the characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda.
The 13th issue of the Transactions on Computational Science journal consists of two parts. The six papers in Part I span the areas of computing collision probability, digital image contour extraction, multiplicatively weighted Voronoi diagrams, multi-phase segmentation, the rough-set approach to incomplete information systems, and fault-tolerant systolic arrays for matrix multiplications. The five papers in Part II focus on neural-network-based trajectory prediction, privacy in vehicular ad-hoc...
A reference manual for home computer users about internet safety and cybercrime prevention. This book highlights the parallel of real world crime, individual rights and responsibilities related to the computer, internet and electronic devices; and how laws should be formulated to fairly balance the privacy, respect, responsibilities, rights and safety of the individual. Published in print 2008.