The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA.
This book constitutes the proceedings of the 35th International Conference on Advanced Information Systems Engineering, CAiSE 2023, which was held in Zaragoza, Spain, during June 12-16, 2023.
The two LNCS volume set 9193-9194 constitutes the refereed proceedings of the First International Conference on Human Aspects of IT for the Aged Population, ITAP 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015, jointly with 15 other thematically conferences.
This book provides a comprehensive review of how digital communication technology can help families network and communicate across generations, despite differences in family composition, residential location, cultural values and orientations.
Sensing a future beyond work lurking in an age of crisis, the 'post-capitalist' utopias of today spread the idea of a permanent escape from work aided by the automation of production, a universal basic income and the reduction of working hours to zero.
Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession.
This book explores hybrid play as a site of interdisciplinary activity-one that is capable of generating new forms of mobility, communication, subjects, and artistic expression as well as new ways of interacting with and understanding the world.
How Flash rose and fell as the world''s most ubiquitous yet divisive software platform, enabling the development and distribution of a world of creative content.
In this popular text for an Numerical Analysis course, the authors introduce several major methods of solving various partial differential equations (PDEs) including elliptic, parabolic, and hyperbolic equations.
This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.
Get hands-on with the browser-based JavaScript library for training and deploying machine learning models effectivelyKey FeaturesBuild, train and run machine learning models in the browser using TensorFlow.
This volume constitutes the refereed proceedings of the First International Conference on Computing, Communication and Learning, CoCoLe 2022, held in Warangal, India, in October 2022.
This book focuses on the "e;algorithmic turn"e; in state surveillance and the development of new platforms that allow the Chinese Communist Party (CCP) to shape human behavior in all areas of life through its widespread social credit system.
The Routledge Companion to Libraries, Archives, and the Digital Humanities covers a wide range of issues encountered in the world's libraries and archives as they continue to expand their support of, and direct engagement in, Digital Humanities (DH) research and teaching.
SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
This book presents advanced research on smart health technologies, focusing on the innovative transformations in diagnosis and treatment planning using medical imaging and data analysed by data science techniques.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance.
Machine Learning: Concepts, Techniques and Applications starts at basic conceptual level of explaining machine learning and goes on to explain the basis of machine learning algorithms.
Social Learning Systems and Communities of Practice is a collection of classical and contemporary writing associated with learning and systemic change in contexts ranging from cities, to rural development to education to nursing to water management to public policy.
Because of their widespread use in mainframes, PCs, and mobile audio and video devices, DRAMs are being manufactured in ever increasing volume, both in stand-alone and in embedded form as part of a system on chip.
This two volume set LNAI 9834 and 9835 constitutes the refereed proceedings of the 9th International Conference on Intelligent Robotics and Applications, ICIRA 2016, held in Tokyo, Japan, in August 2016.