This volume LNCS 12926 constitutes the papers of the 10th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2021, held in September 2021 as part of the DEXA 2021 conference.
This book constitutes the refereed proceedings of the 8th International Conference on Computational Data and Social Networks, CSoNet 2019, held in Ho Chi Minh City, Vietnam, in November 2019.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China.
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence.
The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020.
This book constitutes the proceedings of the 12th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2019, held in Larnaca, Cyprus, in November 2019.
This book constitutes the refereed proceedings of the 13th International Conference on Modern Information Technology and IT Education, held in Moscow, Russia, in November-December 2018.
This book constitutes the refereed post-conference proceedings for the VLBD conference workshops entitled: Towards Polystores That Manage Multiple Databases, Privacy, Security and/or Policy Issues for Heterogenous Data (Poly 2019) and the Fifth International Workshop on Data Management and Analytics for Medicine and Healthcare (DMAH 2019), held in Los Angeles, CA, USA, in August 2019, in conjunction with the 45th International Conference on Very Large Data Bases, VLDB 2019.
Sketching is a natural and intuitive communication tool used for expressing concepts and ideas that are difficult to communicate through text or speech alone.
This book constitutes the refereed proceedings of the 12th International Conference on the Quality of Information and Communications Technology, QUATIC 2019, held in Ciudad Real, Spain, in September 2019.
The book analyzes the most relevant developments in the relation between contracts and technology, from automatically concluded contracts to today's revolutionary "e;smart contracts"e; developed through blockchain, which are beginning to and will increasingly disrupt many economic and social relations.
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020.
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020.
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book constitutes the refereed proceedings of the 8th International Conference on Well-Being in the Information Society, WIS 2020, held in Turku, Finland, in August 2020.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.
This book constitutes the refereed proceedings of the Second International Symposium on Benchmarking, Measuring, and Optimization, Bench 2019, held in Denver, CO, USA, in November 2019.
This book constitutes the refereed proceedings of the 23rd European Conference on Applications of Evolutionary Computation, EvoApplications 2020, held as part of Evo*2020, in Seville, Spain, in April 2020, co-located with the Evo*2020 events EuroGP, EvoMUSART and EvoCOP.
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018.
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future.
This volume constitutes the refereed proceedings of the 26th European Conference on Systems, Software and Services Process Improvement, EuroSPI conference, held in Edinburgh, Scotland, in September 2019.
This book constitutes the thoroughly refereed proceedings of the 10th EAI International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2018, held in Dakar, Senegal, in November 2018.
This study examines findings from a 4-year-long ethnography of communication among a research university's community of scientists and engineers working in nanoscience and nanotechnology.
The major goals of texture research in computer vision are to understand, model, and process texture, and ultimately, to simulate the human visual learning process using computer technologies.
How two pioneers of math and technology ushered in the computer revolutionBoolean algebra, also called Boolean logic, is at the heart of the electronic circuitry in everything we use-from our computers and cars, to home appliances.
More stimulating mathematics puzzles from bestselling author Paul NahinHow do technicians repair broken communications cables at the bottom of the ocean without actually seeing them?
Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA projectKey FeaturesMake the most of Ghidra on different platforms such as Linux, Windows, and macOSLeverage a variety of plug-ins and extensions to perform disassembly, assembly, decompilation, and scriptingDiscover how you can meet your cybersecurity needs by creating custom patches and toolsBook DescriptionGhidra, an open source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS.
Become familiar with Kubernetes and explore techniques to manage your containerized workloads and services Key FeaturesLearn everything from creating a cluster to monitoring applications in KubernetesUnderstand and develop DevOps primitives using KubernetesUse Kubernetes to solve challenging real-life DevOps problemsBook DescriptionKubernetes and DevOps are the two pillars that can keep your business at the top by ensuring high performance of your IT infrastructure.
This publication gives an introductory overview of computer-aided design, industrial design, electronic design automation, CAD standards, digital architecture and molecular design software.
Over 60 recipes to help you design interactive, smart, and cross-platform GUI applicationsKey Features Get succinct QT solutions to pressing GUI programming problems in Python Learn how to effectively implement reactive programming Build customized applications that are robust and reliableBook DescriptionPyQt is one of the best cross-platform interface toolkits currently available; it's stable, mature, and completely native.
This book presents fundamental contributions to computer science The scope of the book is broad in that it covers all aspects of computer science, going from the theory of computation, the theory of programming, and the theory of computer system performance, all the way to computer hardware and to major numerical applications of computers.
Full-color, concise coverage of Pinterest-the wildly popular virtual pinboardWith Pinterest Kickstart, you can kick back and start enjoying the cool features of the unique social networking site that connects you to other users worldwide based on shared tastes and interests.