Sam's in an Instant Assortment 2002
Matchmaking in Electronic Markets (Lecture Notes in Computer Science, #2882) (Lecture Notes in Artificial Intelligence, #2882)
by Daniel J Veit
Electronic negotiations concern transactions on the basis of electronic media, such as the Internet. Platforms have been developed to aid participants in electronic markets during the agreement phase. The key activity in this is the matching of offers and requests, for which we need a ranking of the alternatives. In this book the author defines a framework in which a ranking can be generated in order to acquire an optimal decision for a desired transaction - this process is called matchmaking....
Linear Algebra and Matrix Computations with MATLAB (R) (De Gruyter STEM)
by Dingy'u Xue
This book focuses the solutions of linear algebra and matrix analysis problems, with the exclusive use of MATLAB. The topics include representations, fundamental analysis, transformations of matrices, matrix equation solutions as well as matrix functions. Attempts on matrix and linear algebra applications are also explored.
On behalf of the Organizing Committee for Pervasive 2008, welcome to the proceedings of the 6th International Conference on Pervasive Computing. The year2008wasthesecondtimeinasmanyyearsthatthePervasiveconferencehas attempted to "globalize": For the second year in a row the conference was held outside of Europe. The conference is seen as one of the most respected venues for publishing researchon pervasive and ubiquitous computing and captures the state of the art in pervasive computing research....
A People's History of Computing in the United States
by Joy Lisi Rankin
Silicon Valley gets all the credit for digital creativity, but this account of the pre-PC world, when computing meant more than using mature consumer technology, challenges that triumphalism.The invention of the personal computer liberated users from corporate mainframes and brought computing into homes. But throughout the 1960s and 1970s a diverse group of teachers and students working together on academic computing systems conducted many of the activities we now recognize as personal and socia...
Security Technology, Disaster Recovery and Business Continuity (Communications in Computer and Information Science, #122)
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery...
MOOCs and Their Afterlives
A trio of headlines in the Chronicle of Higher Education seem to say it all: in 2013, "A Bold Move Toward MOOCs Sends Shock Waves;" in 2014, "Doubts About MOOCs Continue to Rise," and in 2015, "The MOOC Hype Fades." At the beginning of the 2010s, MOOCs, or Massive Open Online Courses, seemed poised to completely revolutionize higher education. But now, just a few years into the revolution, educators' enthusiasm seems to have cooled. As advocates and critics try to make sense of the rise and fall...
Information Processing and Management (Communications in Computer and Information Science, #70)
It is my pleasure to write the preface for Information Processing and Management. This book aims to bring together innovative results and new research trends in inf- mation processing, computer science and management engineering. If an information processing system is able to perform useful actions for an obj- tive in a given domain, it is because the system knows something about that domain. The more knowledge it has, the more useful it can be to its users. Without that kno- edge, the system it...
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. The book marks the result of the IFIP WG 8. 2 conference on "Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges. " Since its inception in the late 1970s, IFIP WG 8. 2 has sought to under...
A Different Look at Artificial Intelligence
by Ulrike Barthelmeß and Ulrich Furbach
Digitalization is inexorably conquering our lives - also with artificial intelligence (AI) methods. Search engine operators, social network operators and shipping platform operators know more and more about us, about our buying and living habits. User data has become a valuable commodity. We live and work with computer systems that behave intelligently or are even intelligent. Questions like "Can machines be intelligent?" or "Can they have emotions or a consciousness?" keep popping up. To enab...
Collaborative Agents - Research and Development (Lecture Notes in Computer Science, #6066)
This book constitutes the thoroughly refereed post-conference proceedings of the first two international workshops on computational models of collaboration in distributed systems: CARE 2009, held as satellite event of the 22nd Australasian Joint Conference on Artificial Intelligence AI09 in Melbourne, Australia, in December 2009 and CARE 2010, held in conjunction with the International Conference on Intelligent Agent Technology (IAT) in Toronto, Canada, in August 2010. The 12 revised full paper...
Video Chatting for Seniors in easy steps (In Easy Steps)
by Nick Vandome
Video Chatting for Seniors in easy steps enables readers to fully embrace the world of video chatting - including Zoom, FaceTime, Skype, and Facebook Messenger. Written with the Senior reader in mind and presented in larger type for easier reading. In the digital world there is sometimes one event that can propel a technology to the forefront of the public's awareness. In the case of video chatting this has been the Covid-19 pandemic. Video chatting has been used, in one form or another, for man...
Changes in society resulting from the pervasiveness of information technology have produced positive and negative, intended and unintended consequences. Key among them is the exclusion of individuals—who lack access to technological resources—from various societal processes and services. The theme of this book, social inclusion, explores the many dimensions of this exclusion. This issue has been the focus of much debate within the social sciences, yet has largely been underresearched in the Info...
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2020, held in Ebène City, Mauritius, in December 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers were carefully selected from 90 submissions. The papers are organized in four thematic sections on dynamic spectrum access and mesh networks; wireless sensing and 5G networks; software-defined network...
The Mobile Learning Mindset series offers practical knowledge and strategies for successful implementation of K-12 BYOD programs and 1:1 initiatives. This six-book series provides district leaders, principals, teachers, IT staff, educational coaches and parents with the information they need to make any mobile learning program a success. The District Leader's Guideto Implementation and the Principal's Guide to Implementation share lessons learned and provide many examples and activities that wil...
The three-volume set LNCS 8009-8011 constitutes the refereed proceedings of the 7th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. The...
This is the second part of the two-volume set (LNCS 8023-8024) that constitutes the refereed proceedings of the 5th International Conference on Cross-Cultural Design, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These pap...
Secure IT Systems (Security and Cryptology, #10674) (Lecture Notes in Computer Science, #10674)
This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
Blogging has profoundly influenced not only the nature of the internet today, but also the nature of modern communication, despite being a genre invented less than a decade ago. This book-length study of a now everyday phenomenon provides a close look at blogging while placing it in a historical, theoretical and contemporary context. Scholars, students and bloggers will find a lively survey of blogging that contextualises blogs in terms of critical theory and the history of digital media. Autho...
In video arcades and family rooms across America, children wielding joysticks cluster around display screens for hours playing video games. Like computers video games are now an integral part of the educational, social and cultural experience of childhood and in this book Eugene Provenzo explores the meaning of this phenomenon. Because of its domination of the video game industry, Provenzo focuses specifically on the Japanese Nintendo Corporation. Although it is widely acknowledged that computer...
Marketing Tourism Destinations Online