This book constitutes the refereed proceedings of the 11th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Greece, in June 2014, jointly with 13 other thematically similar conferences.
The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences.
The two-volume set LNCS 8523-8524 constitutes the refereed proceedings of the First International Conference on Learning and Collaboration Technologies, LCT 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically similar conferences.
The two-volume set LNCS 8523-8524 constitutes the refereed proceedings of the First International Conference on Learning and Collaboration Technologies, LCT 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically similar conferences.
The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences.
The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences.
The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences.
The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences.
The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences.
This book examines the reasons why various groups around the world choose not to adopt broadband services and evaluates strategies to stimulate the demand that will lead to increased broadband use.
This book constitutes the refereed proceedings of the 9th International Conference on Persuasive Technology, PERSUASIVE 2014, held in Padua, Italy, in May 2014.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining.
This book constitutes the refereed proceedings of the 7th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2014, held in Washington, DC, USA, in April 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2013) held in Paris, France, in November 2013.
This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy.
Written by a team of world-renowned artists, researchers and practitioners - all pioneers in using augmented reality based creative works and installations as a new form of art - this is the first book to explore the exciting new field of augmented reality art and its enabling technologies.
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user's situational needs and interact with other services or resources in their environment on an ad-hoc basis.
This book constitutes the refereed proceedings of the workshops co-located with the 4th International Joint Conference on Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013.
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013.
This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications.
This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Ambient Media and Systems, AMBI-SYS 2013, held in Athens, Greece, in March 2013.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013.
This book constitutes the refereed proceedings of the European Conference on Information Literacy, ECIL 2013, held in Istanbul Turkey, in October 2013.
This book constitutes the refereed proceedings of the 6th International Workshop on Multiple Access Communications, MACOM 2013, held in Vilnius, Lithuania, in December 2013.
This book constitutes the refereed proceedings of the 4th International Joint Conference an Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013.
This book constitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2013, held in Guanacaste, Costa Rica, in December 2013.
This book constitutes the refereed proceedings of the 5th International Conference on Social Robotics, ICSR 2013, held in Bristol, UK, in October 2013.
The views of leading researchers on the emerging topic of post-mortem digital legacy and posthumous interaction are explored in this book which combines the technical, cultural and legal aspects associated with this new branch of HCI.
Das Internet: ungeahnte Möglichkeiten, beeindruckende Innovationsstätte – und Spielplatz für eine völlig neue Generation von Finanzgeschäften, die schnelles Geld versprechen.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data.