This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad, and exchanging their research and innovative ideas in the field of Artificial Intelligence and Information Technologies.
*MAKE VISUAL DETOXING YOUR NEW YEAR S RESOLUTION FOR 2025*'This book is the new Ways of Seeing' Sharmadean Reid | 'Necessary reading for everyone who uses the internet' Emma Dabiri |'Brilliant insights .
Step Into a Brighter Future for Our Children: Navigating the Digital LandscapeIn a world increasingly dominated by screens, how do we safeguard the innocence of childhood and the mental well-being of our next generation?
Cognitive computing simulates human thought processes with self-learning algorithms that utilize data mining, pattern recognition, and natural language processing.
In BLACK MEME, Legacy Russell, awardwinning author of the groundbreaking GLITCH FEMINISM, explores the "e;meme"e; as mapped to Black visual culture from 1900 to the present, mining both archival and contemporary media.
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection.
Describing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow Applications presents a concise approach to the integration of loosely coupled services into workflow applications.
Capable of acquiring large volumes of data through sensors deployed in air, land, and sea, and making this information readily available in a continuous time frame, the science of geographical information system (GIS) is rapidly evolving.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Shadow Algorithms Data Miner provides a high-level understanding of the complete set of shadow concepts and algorithms, addressing their usefulness from a larger graphics system perspective.
This edited collection provides an overview of the recent developments in computational social science related to China studies and presents interdisciplinary empirical work from diverse scholars on culture, public opinion, and education using advanced computational methods and big data.
This edited collection provides an overview of the recent developments in computational social science related to China studies and presents interdisciplinary empirical work from diverse scholars on culture, public opinion, and education using advanced computational methods and big data.
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet.
Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.
Exploring the latest developments in the technology and pedagogy of higher education, Technological Advances in Interactive Collaborative Learning presents information technology-oriented educational programs for the next generation of scientists and researchers.
Researchers, academicians and professionals expone in this book their research in the application of intelligent computing techniques to software engineering.