Coping with spatial expressions in a plausible manner is a crucial problem in a number of research fields, specifically cognitive science, artificial intelligence, psychology, and linguistics.
The increasingly sophisticated and powerful information technology we are creating plays an ever more prominent role in facilitating interaction and cooperation in everyday life.
The increasingly sophisticated and powerful information technology we are creating plays an ever more prominent role in facilitating interaction and cooperation in everyday life.
CSCL 2: Carrying Forward the Conversation is a thorough and up-to-date survey of recent developments in Computer Supported Collaborative Learning, one of the fastest growing areas of research in the learning sciences.
CSCL 2: Carrying Forward the Conversation is a thorough and up-to-date survey of recent developments in Computer Supported Collaborative Learning, one of the fastest growing areas of research in the learning sciences.
The National Science Foundation funded the first Coordination Theory and Collaboration Technology initiative to look at systems that support collaborations in business and elsewhere.
The National Science Foundation funded the first Coordination Theory and Collaboration Technology initiative to look at systems that support collaborations in business and elsewhere.
This book is primarily a summary of research done over 10 years in multimedia and virtual reality, which fits within a wider interest of exploiting psychological theory to improve the process of designing interactive systems.
This book is primarily a summary of research done over 10 years in multimedia and virtual reality, which fits within a wider interest of exploiting psychological theory to improve the process of designing interactive systems.
The leading thinkers from the cognitive science tradition participated in a workshop sponsored by Sandia National Laboratories in July of 2003 to discuss progress in building their models.
The leading thinkers from the cognitive science tradition participated in a workshop sponsored by Sandia National Laboratories in July of 2003 to discuss progress in building their models.
This volume is the first to examine the social, cultural, and political implications of the shift from the traditional forms and functions of print-based libraries to the delivery of online information in educational contexts.
This volume is the first to examine the social, cultural, and political implications of the shift from the traditional forms and functions of print-based libraries to the delivery of online information in educational contexts.
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation.
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts.
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management.
The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge.
The influx of computer technology into classrooms during the past decade raises the questions -- how can we teach children to use computers productively and what effect will learning to program computers have on them?
The influx of computer technology into classrooms during the past decade raises the questions -- how can we teach children to use computers productively and what effect will learning to program computers have on them?
It has become increasingly difficult to ignore the ways that the centrality of new media and technologies - from the global networking of information systems and social media to new possibilities for altering human genetics - seem to make obsolete our traditional ways of thinking about ethics and persuasive communication inherited from earlier humanist paradigms.
It has become increasingly difficult to ignore the ways that the centrality of new media and technologies - from the global networking of information systems and social media to new possibilities for altering human genetics - seem to make obsolete our traditional ways of thinking about ethics and persuasive communication inherited from earlier humanist paradigms.