Browse Results

Showing 20,451 through 20,475 of 53,402 results

Critical Information Infrastructures Security: 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science #8985)

by Georgios Ellinas Elias Kyriakides Christos G. Panayiotou Marios M. Polycarpou

This bookconstitutes revised selected papers from the 9th International Conference onCritical Information Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014. The 20 fulland 19 short papers presented in this volume were carefully reviewed andselected from 74 submissions. They are organized in topical sections named:cyber-physical systems and sensor networks; security of water systems; powerand energy system security; security and recovery policies, cyber security; andsecurity tools and protocols.

Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9578)

by Marianthi Theocharidou Erich Rome Stephen Wolthusen

This book constitutesrevised selected papers from the 10th International Conference on CriticalInformation Infrastructures Security, CRITIS 2015, held in Berlin, Germany, inOctober 2015. The 18 full and 6short papers presented in this volume were carefully reviewed and selected from54 submissions. They are organized in topical sections named: critical informationinfrastructure protection; critical infrastructure resilience assessment; emergencymanagement: critical infrastructure preparedness; modelling, simulation and analysisapproaches; electric grid protection and resilience; and CIPRNet young CRITIS awardcandidate papers.

Critical Infrastructure Protection Research: Results of the First Critical Infrastructure Protection Research Project in Hungary (Topics in Intelligent Engineering and Informatics #12)

by László Nádai József Padányi

This bookpresents recent research in the recognition of vulnerabilities of nationalsystems and assets which gained special attention for the CriticalInfrastructures in the last two decades. The book concentrates on R&Dactivities in the relation of Critical Infrastructures focusing on enhancingthe performance of services as well as the level of security. The objectives ofthe book are based on a project entitled "Critical InfrastructureProtection Researches" (TÁMOP-4. 2. 1. B-11/2/KMR-2011-0001) whichconcentrated on innovative UAV solutions, robotics, cybersecurity, surfaceengineering, and mechatornics and technologies providing safe operations ofessential assets. This report is summarizing the methodologies and effortstaken to fulfill the goals defined. The project has been performed by theconsortium of the Óbuda University and the National University of PublicService.

Critical Perspectives on Open Development: Empirical Interrogation of Theory Construction (International Development Research Centre)

by Arul Chib, Caitlin M. Bentley, and Matthew L. Smith

Theoretical and empirical analyses of whether open innovations in international development instrumentally advantages poor and marginalized populations.Over the last ten years, "open" innovations--the sharing of information without access restrictions or cost--have emerged within international development. But do these practices instrumentally advantage poor and marginalized populations? This book examines whether, for whom, and under what circumstances the free, networked, public sharing of information and communication resources contributes (or not) towards a process of positive social transformation. The contributors offer both theoretical and empirical analyses that cover a broad range of applications, emphasizing the underlying aspects of open innovations that are shared across contexts and domains.

Critical Systems: Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings (Lecture Notes in Computer Science #9933)

by Stefania Gnesi Alexander Knapp Maurice H. ter Beek

This book constitutes the refereed proceedings of the Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and the 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, held in Pisa, Italy, in September 2016. The 11 full papers and 4 short papers presented together with one invited talk were carefully reviewed and selected from 24 submissions. They are organized in the following sections: automated verification techniques; model-based system analysis; and applications and case studies.

Cross-Cultural Computing: An Artist's Journey (Springer Series on Cultural Computing)

by Naoko Tosa

This exciting new book explores the relationship between cultural traditions and computers, looking at how people from very different cultures and backgrounds communicate and how the use of information technologies can support and enhance these dialogues. Historically we developed our understanding of other cultures through traditional means (museums, printed literature, etc. ) but the advent of information technologies has allowed us access to a plethora of material. Tosa asks the question "Can we understand other cultures using computers as media to supplement thinking and memorization?" Starting with a survey of art and technology, moving into the area of culture and technology, the book culminates with a vision of a new world based on an understanding of these relationships, allowing cultural creators and viewers the opportunity to reach a better and more profound understanding of the role information technology will play going forward.

Cross-Cultural Multimedia Computing: Semantic and Aesthetic Modeling (SpringerBriefs in Computer Science)

by Shlomo Dubnov Kevin Burns Yasushi Kiyoki

The ability to communicate cultural codes in multimedia depends on their meaning and beauty, as perceived by different audiences around the globe. In this book, the ongoing research on computational modeling of visual, musical and textual contents is described in terms of identifying and mapping their semantic representations across different cultures. The underlying psychology of sense-making is quantified through analysis of aesthetics in terms of organizational and structural aspects of the contents that influence an audience's formation of expectations for future signals, violations of these expectations, and explanations of their meaning. Complexity-accuracy tradeoffs in sound representation are further used to develop new computational methods that capture poietic and aesthetic aspects in music communication. Experimental studies are reported that try to characterize preferences for complexity in abstract, classical and traditional art and music across samples of Western and Far Eastern cultures. These experiments illustrate how aesthetics can be computed in terms of semantic and information measures, highlighting commonalities and uncovering differences in aesthetic preferences across cultures and individuals.

Crossing Fandoms: SuperWhoLock and the Contemporary Fan Audience

by Paul Booth

This book examines the fan-created combination of Doctor Who, Sherlock, and Supernatural as a uniquely digital fan experience, and as a metaphor for ongoing scholarship into contemporary fandom. What do you get when you cross the cult shows Doctor Who, Supernatural, and Sherlock? In this book, Paul Booth explores the fan-created crossover universe known as SuperWhoLock--a universe where Sherlock Holmes and Dean Winchester work together to fight monsters like the Daleks and the Weeping Angels; a world where John Watson is friends with Amy Pond; a space where the unique brands of fandom interact. Booth argues that SuperWhoLock represents more than just those three shows--it is a way of doing fandom. Through interviews with fans and analysis of fan texts, Crossing Fandoms: SuperWhoLock and the Contemporary Fan Audience also demonstrates how fan studies in the digital age can evolve to take into account changing fan activities and texts.

Crossy Road Guía de Juego

by António José Leite da Silva Correia Hiddenstuff Entertainment

Comrpando este guia de jogo avançado e detalhado, eis o que irás obter: - Dicas profissionais e estratégias. - Cheats e Hacks. - Segredos, dicas, cheats, desbloqueadores e truques usados pelos jogadores Pro! - Como obter dinheiro e moedas em abundância. - E MUITO MAIS! Todas as versões deste guia têm imagens que te ajudam a compreender melhor o jogo. Não há um guia tão compreensivo e avançado como este. Estarás satisfeito com este guia e irás beneficiar muito mais quando comparado com outros guias que andam por aí. Compra agora e derrota os teus adversários. Torna-te hoje um jogador Pro!

Crowdsourced Health: How What You Do on the Internet Will Improve Medicine

by Elad Yom-Tov

How data from our health-related Internet searches can lead to discoveries about diseases and symptoms and help patients deal with diagnoses. Most of us have gone online to search for information about health. What are the symptoms of a migraine? How effective is this drug? Where can I find more resources for cancer patients? Could I have an STD? Am I fat? A Pew survey reports more than 80 percent of American Internet users have logged on to ask questions like these. But what if the digital traces left by our searches could show doctors and medical researchers something new and interesting? What if the data generated by our searches could reveal information about health that would be difficult to gather in other ways? In this book, Elad Yom-Tov argues that Internet data could change the way medical research is done, supplementing traditional tools to provide insights not otherwise available. He describes how studies of Internet searches have, among other things, already helped researchers track to side effects of prescription drugs, to understand the information needs of cancer patients and their families, and to recognize some of the causes of anorexia. Yom-Tov shows that the information collected can benefit humanity without sacrificing individual privacy. He explains why people go to the Internet with health questions; for one thing, it seems to be a safe place to ask anonymously about such matters as obesity, sex, and pregnancy. He describes in detrimental effects of “pro-anorexia” online content; tells how computer scientists can scour search engine data to improve public health by, for example, identifying risk factors for disease and centers of contagion; and tells how analyses of how people deal with upsetting diagnoses help doctors to treat patients and patients to understand their conditions.

Cryptographic Hardware and Embedded Systems - CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Lecture Notes in Computer Science #9813)

by Axel Y. Poschmann Benedikt Gierlichs

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9540)

by Enes Pasalic Lars R. Knudsen

This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryption.

Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (Lecture Notes in Computer Science #10052)

by Sara Foresti and Giuseppe Persiano

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.

Cryptology Transmitted Message Protection: From Deterministic Chaos up to Optical Vortices (Signals and Communication Technology)

by Igor Izmailov Boris Poizner Ilia Romanov Sergey Smolskiy

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

The CS Detective: An Algorithmic Tale of Crime, Conspiracy, and Computation

by Jeremy Kubica

Meet Frank Runtime. Disgraced ex-detective. Hard-boiled private eye. Search expert.When a robbery hits police headquarters, it’s up to Frank Runtime and his extensive search skills to catch the culprits. In this detective story, you’ll learn how to use algorithmic tools to solve the case. Runtime scours smugglers’ boats with binary search, tails spies with a search tree, escapes a prison with depth-first search, and picks locks with priority queues. Joined by know-it-all rookie Officer Notation and inept tag-along Socks, he follows a series of leads in a best-first search that unravels a deep conspiracy. Each chapter introduces a thrilling twist matched with a new algorithmic concept, ending with a technical recap.Perfect for computer science students and amateur sleuths alike, The CS Detective adds an entertaining twist to learning algorithms.Follow Frank’s mission and learn:–The algorithms behind best-first and depth-first search, iterative deepening, parallelizing, binary search, and more–Basic computational concepts like strings, arrays, stacks, and queues–How to adapt search algorithms to unusual data structures–The most efficient algorithms to use in a given situation, and when to apply common-sense heuristic methods

CSR Racing 2 Hacks del Juego, Apk, Tips para descargar la Guía no Oficial

by Emmanuel Castro Hernández Joshua Abbott

CSR Racing 2 es la continuación de CSR Racing, y finalmente ha llegado. Lanzado por Zynga y Natural Motion. Aunque parece el mismo que la primera versión (carreras de arranques, mejorando tu propio coche y comprando otros) es, de hecho, diferente. Así que estamos aquí para ayudarte mientras te damos trampas, tips y trucos por escrito, ¡especialmente para este juego! Sólo recuerda, no uses esos tips en la vida real. ¡te meterías en problemas!

CSS Floating

by Eric A. Meyer

While flowing text around images is certainly nothing new, with CSS you can float any element, from images to paragraphs to lists. In this practical guide, author Eric Meyer reveals some interesting--and surprising--ways to use CSS floats in your web design, including the latest capability to flow content past non-rectangular float shapes.Short and sweet, this book is an excerpt from the upcoming fourth edition of CSS: The Definitive Guide. When you purchase either the print or the ebook edition of CSS Floating, you'll receive a discount on the entire Definitive Guide once it's released. Why wait? Learn how to bring life to your web pages now.Learn the characteristics of floated elements, and CSS rules for using themBe aware of certain rule exceptions when applying floats to your design, including the use of negative marginsUse the clear property to prevent floats from affecting elements in the next section of the documentCreate floating boxes in non-rectangular shapes, including rounded corners, circles, ellipses, and even polygonsDefine float shapes with transparent or opaque images

Cult of Analytics: Data analytics for marketing (Emarketing Essentials Ser.)

by Steve Jackson

Cult of Analytics enables professionals to build an analytics driven culture into their business or organization. Marketers will learn how to turn tried and tested tactics into an actionable plan to change their culture to one that uses web analytics on a day to day basis.Through use of the fictitious ACME PLC case, Steve Jackson provides working examples based on real life situations from the various companies he has worked with, such as Nokia, KONE, Rovio, Amazon, Expert, IKEA, Vodafone, and EMC. These examples will give the reader practical techniques for their own business regardless of size or situation making Cult of Analytics a must have for any would-be digital marketer. This new edition has been thoroughly updated, now including examples out of how to get the best from Google analytics, as well as ways to use social media data, big data, tag management and advanced persona segmentation to drive real value in your organisation. It's also been expanded to include exercises and new cases for students and tutors using the book as a text.

Cultural Robotics: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Lecture Notes in Computer Science #9549)

by Jeffrey T.K.V. Koh Belinda J. Dunstan David Silvera-Tawil Mari Velonaki

This LNAI 9549 constitutes the refereed proceedings of the First International Workshop in Cultural Robotics 2015, held as part of the 24th International Symposium on Robot and Human Interactive Communication held in Kobe, Japan, in August/September 2015. A total of 12 full papers and 1 short paper were accepted from a total of 26 initially submitted. The following papers are organized into four categories. These categories are indicative of the extent to which culture has influenced the design or application of the robots involved, and explore a progression in the emersion and overlap between human and robotic generated culture.

Culture, Technology, Communication. Common World, Different Futures: 10th IFIP WG 13.8 International Conference, CaTaC 2016, London, UK, June 15-17, 2016, Revised Selected Papers (IFIP Advances in Information and Communication Technology #490)

by Charles Ess José Abdelnour-Nocera Michele Strano Maja Van der Velden Herbert Hrachovec

This volume constitutes the refereed post-conference proceedings of the 10th IFIP WG 13. 8 International Conference on Culture, Technology, and Communication, CaTaC 2016, held in London, UK, in June 2016. The 9 revised full papers were carefully reviewed and selected from 22 submissions. The papers explore the intersections between culture, technology, and communication, applying different theoretical and methodological perspectives, genres, and styles. They deal with cultural attitudes towards technology and communication, interaction design, and international development.

Curating the Digital: Space for Art and Interaction (Springer Series on Cultural Computing #0)

by David England Thecla Schiphorst Nick Bryan-Kinns

This bookcombines work from curators, digital artists, human computer interactionresearchers and computer scientists to examine the mutual benefits andchallenges posed when working together to support digital art works in theirmany forms. In Curating the Digitalwe explore how we can work together to make space for art and interaction. Welook at the various challenges such as the dynamic nature of our media, theproblems posed in preserving digital art works and the thorny problems of howwe assess and measure audience's reactions to interactive digital work. Curating the Digital is an outcome of a multi-disciplinary workshop that took place atSICHI2014 in Toronto. The participants from the workshop reflected on the themeof Curating the Digital via a series of presentations and rapid prototypingexercises to develop a catalogue for the future digital art gallery. Theresults produce a variety of insights both around the theory and philosophy ofcurating digital works, and also around the practical and technicalpossibilities and challenges. We present these complimentary chapters so thatother researchers and practitioners in related fields will find motivation andimagination for their own work.

Curation: The power of selection in a world of excess

by Michael Bhaskar

'A terrific and important book . . . it's a great, fresh take on how the 21st century is transforming the way we select everything from food to music' David Bodanis, author of E=MC2In the past two years humanity has produced more data than the rest of human history combined. We carry a library of data in our pockets, accessible at any second. We have more information and more goods at our disposal than we know what to do with. There is no longer any competitive advantage in creating more information. Today, value lies in curation: selecting, finding and cutting down to show what really matters.Curation reveals how a little-used word from the world of museums became a crucial and at times controversial strategy for the twenty-first century. Today's most successful companies - Apple, Netflix, Amazon - have used curation to power their growth, by offering customers more tailored and appropriate choices.Curation answers the question of how we can live and prosper in an age of information overload. In the context of excess, it is not only a sound business strategy, but a way to make sense of the world.

Current Developments in Web Based Learning: ICWL 2015 International Workshops, KMEL, IWUM, LA, Guangzhou, China, November 5-8, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9584)

by Zhiguo Gong Dickson K. W. Chiu Di Zou

This bookconstitutes the thoroughly revised selected papers of the workshops of the 14thInternational Conference of Web Based Learning, ICWL 2015, held in Guangzhou,China, in November 2015. This volumecomprises papers of three workshops: 1. The 5thInternational Symposium on Knowledge Management and E-Learning, KMEL 2015 2. Thefirst International Workshop on User Modeling for Web Based Learning, IWUM 2015 3. TheInternational Workshop on Learning Analytics

Current Trends in Web Engineering: ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papers (Lecture Notes in Computer Science #9881)

by Cesare Pautasso Sven Casteleyn Peter Dolog

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Conference on Web Engineering, ICWE 2016, held in Lugano, Switzerland, in June 2016. The 15 revised full papers together with 5 short papers were selected form 37 submissions. The workshops complement the main conference, and provide a forum for researchers and practitioners to discuss emerging topics. As a result, the workshop committee accepted six workshops, of which the following four contributed papers to this volume: 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2016) 2nd International Workshop on Mining the Social Web (SoWeMine 2016) 1st International Workshop on Liquid Multi-Device Software for the Web (LiquidWS 2016) 5th Workshop on Distributed User Interfaces: Distributing Interactions (DUI 2016)

Cyber Deception: Building the Scientific Foundation

by Sushil Jajodia Cliff Wang V. S. Subrahmanian Vipin Swarup

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Refine Search

Showing 20,451 through 20,475 of 53,402 results