Résultats de recherche de titre
Articles 39681 à 39700 sur 46512
Computer Supported Cooperative Work and Social Computing: 17th CCF Conference, ChineseCSCW 2022, Taiyuan, China, November 25–27, 2022, Revised Selected Papers, Part I (Communications in Computer and Information Science #1681)
Par Yuqing Sun, Tun Lu, Yinzhang Guo, Xiaoxia Song, Hongfei Fan, Dongning Liu, Liping Gao, Bowen Du. 2023
This two-volume set constitutes the refereed proceedings of the 17th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022 held…
in Taiyuan, China, during November 25–27, 2022.The 60 full papers and 30 short papers included in this two-volume set were carefully reviewed and selected from 211 submissions. They were organized in topical sections as follows: answer set programming; Social Media and Online Communities, Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.How Bulgaria transformed the computer industry behind the Iron Curtain—and the consequences of that transformation for a society that dreamt…
of a brighter future.Bulgaria in 1963 was a communist country led by a centralized party trying to navigate a multinational Cold War. The state needed money, and it sought prestige. By cultivating a burgeoning computer industry, Bulgaria achieved both but at great cost to the established order. In Balkan Cyberia, Victor Petrov elevates a deeply researched, local story of ambition into an essential history of global innovation, ideological conflict, and exchange. Granted tremendous freedom by the Politburo and backed by a concerted state secret intelligence effort, a new, privileged class of technical intellectuals and managers rose to prominence in Bulgaria in the 1960s. Plugged in to transnational business and professional networks, they strove to realize the party&’s radical dreams of utopian automation, and Bulgaria would come to manufacture up to half of the Eastern Bloc&’s electronics. Yet, as Petrov shows, the export-oriented nature of the industry also led to the disruption of party rule. Technicians, now thinking with and through computers, began to recast the dominant intellectual discourse within a framework of reform, while technocratic managers translated their newfound political clout into economic power that served them well before and after the revolutions of 1989.Balkan Cyberia reveals the extension of economic and political networks of influence far past the reputed fall of communism, along with the pivotal role small countries played in geopolitical games at the time. Through the prism of the Bulgarian computer industry, the true nature of the socialist international economy, and indeed the links between capitalism and communism, emerge.Computer Supported Cooperative Work and Social Computing: 17th CCF Conference, ChineseCSCW 2022, Taiyuan, China, November 25–27, 2022, Revised Selected Papers, Part II (Communications in Computer and Information Science #1682)
Par Yuqing Sun, Tun Lu, Yinzhang Guo, Xiaoxia Song, Hongfei Fan, Dongning Liu, Liping Gao, Bowen Du. 2023
This two-volume set constitutes the refereed proceedings of the 17th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022 held…
in Datong, China, during September 23–25, 2022.The 60 full papers and 30 short papers included in this two-volume set were carefully reviewed and selected from 211 submissions. They were organized in topical sections as follows: answer set programming; Social Media and Online Communities, Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.The Routledge International Handbook of Digital Social Work (Routledge International Handbooks)
Par Antonio López Peláez, Gloria Kirwan. 2023
This handbook provides an authoritative and cutting-edge overview of current research and trends related to the emerging field of digital…
technology and social work. This book is divided into six sections: Part 1 Reframing Social Work in a Digital SocietyPart 2 Shaping a Science of Social Work in the Digital SocietyPart 3 Digital Social Work in PracticePart 4 The Ethics of Digital Social WorkPart 5 Digital Social Work and the Digitalization of Welfare Institutions: Opportunities, Challenges and Country CasesPart 6 Digital Social Work: Future Challenges, Directions and Transformations This book, comprised of 40 specially commissioned chapters, explores the main intersections between social work theory and practice in an increasingly digitized world. Bringing a critical focus to how social work as a profession is adapting exponentially to embrace the benefits of technology, it gives specific consideration to the digitalization of the social work profession, including the ways in which social workers are using different forms of technology to provide effective services and innovative practice responses. With chapters on big data, digital archiving, e-citizenship and inclusion, gerontechnology, children and technology, and data ethics, this book will be of interest to all social work scholars, students and professionals as well as those working in science and technology studies more broadly.Information Technologies and Mathematical Modelling. Queueing Theory and Applications: 21st International Conference, ITMM 2022, Karshi, Uzbekistan, October 25–29, 2022, Revised Selected Papers (Communications in Computer and Information Science #1803)
Par Alexander Dudin, Anatoly Nazarov, Alexander Moiseev. 2023
This book constitutes the refereed proceedings of the 21st International Conference on Information Technologies and Mathematical Modelling. Queueing Theory and…
Applications, ITMM 2022, held in Karshi, Uzbekistan, during October 25–29, 2022. The 19 full papers included in this book were carefully reviewed and selected from 89 submissions. The papers are devoted to new results in queueing theory and its applications. Its target audience includes specialists in probabilistic theory, random processes, mathematical modeling as well as engineers engaged in logical and technical design and operational management of data processing systems, communication, and computer networks.This book constitutes the refereed post-conference proceedings of the 14th BenchCouncil International Symposium on Benchmarking, Measuring, and Optimization, Bench 2022, held…
virtually in November 2022.The 10 revised full papers presented were carefully reviewed and selected from 20 submissions. The papers are organized in topical sections named: Architecture and System, Algorithm and Dataset, Network and Memory.Metareasoning for Robots: Adapting in Dynamic and Uncertain Environments (Synthesis Lectures on Computer Science)
Par Jeffrey W. Herrmann. 2023
This book is a state of the art resource that robotics researchers and engineers can use to make their robots and…
autonomous vehicles smarter. Readers will be able to describe metareasoning, select an appropriate metareasoning approach, and synthesize metareasoning policies. Metareasoning for Robots adopts a systems engineering perspective in which metareasoning is an approach that can improve the overall robot or autonomous system, not just one component or subsystem. This book introduces key concepts, discusses design options for metareasoning approaches and policies, and presents approaches for testing and evaluation of metareasoning policies. After considering the conceptual design phase, it discusses how to implement metareasoning in the robot’s software architecture and how to synthesize metareasoning policies. Every chapter has references to valuable works on robotics and metareasoning, and the book uses examples from the author’s own research and from other research groups to illustrate these ideas. In addition, this book provides links to books and papers for readers who wish to investigate these topics further.Representation Learning for Natural Language Processing
Par Maosong Sun, Zhiyuan Liu, Yankai Lin. 2020
This open access book provides an overview of the recent advances in representation learning theory, algorithms and applications for natural…
language processing (NLP). It is divided into three parts. Part I presents the representation learning techniques for multiple language entries, including words, phrases, sentences and documents. Part II then introduces the representation techniques for those objects that are closely related to NLP, including entity-based world knowledge, sememe-based linguistic knowledge, networks, and cross-modal entries. Lastly, Part III provides open resource tools for representation learning techniques, and discusses the remaining challenges and future research directions. The theories and algorithms of representation learning presented can also benefit other related domains such as machine learning, social network analysis, semantic Web, information retrieval, data mining and computational biology. This book is intended for advanced undergraduate and graduate students, post-doctoral fellows, researchers, lecturers, and industrial engineers, as well as anyone interested in representation learning and natural language processing.Emerging Trends in Expert Applications and Security: Proceedings of 2nd ICETEAS 2023, Volume 1 (Lecture Notes in Networks and Systems #681)
Par Vijay Singh Rathore, João Manuel R. S. Tavares, Vincenzo Piuri, B. Surendiran. 2023
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for…
system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2023 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during February 17–19, 2023. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.Capturing the Senses: Digital Methods for Sensory Archaeologies (Quantitative Methods in the Humanities and Social Sciences)
Par Giacomo Landeschi, Eleanor Betts. 2023
This open-access book surveys how digital technology can contribute effectively to improving our understanding of the past, through a sensory…
engagement based on the evidence of material culture. In particular, it encourages specialists to consider senses and human agency as important factors in studying ancient space, while recognising the role played by digital tools in enhancing a human-centred form of analysis. Significant advances in archaeological computing, digital methods, and sensory approaches have led archaeologists to rethink strategies and methods for creating narratives of the past. Recent progress in data visualisation and implementation, as well as other nascent digital sensory methods, means that it is now easier to explore and experience ancient space from a multiscalar perspective, from the individual body or single building to the wider landscape.The chapters in Capturing the Senses: Digital Methods for Sensory Archaeologies present innovative methods for representing an embodied experience of ancient space, simulating (but not recreating) ancient behaviours and social interaction. Chapters cover topics including the potentials and pitfalls of visualising, recreating, and re-enacting/experiencing the senses in Virtual Reality environments and also digital reconstructions and auralisations of ancient spaces to study sound sensory perception. Overall, the book demonstrates that multisensory approaches can give a new perspective on how ancient spaces were intended to be used by inhabitants to fulfil a series of purposes including conveying messages and regulating movement. This is an open-access book.Understand the role that Dataverse plays in the low-code revolution that helps businesses gain advantage from being more agile with…
technology. This book shows you how to use Dataverse to solve business problems by describing the layers of a solution in the Power Platform and the options that exist at each layer so you can make informed decisions as you develop your solutions. The book shows how Dataverse is a central piece of the Microsoft Power Platform and helps tech-savvy professionals move nimbly and seize the day when opportunities present themselves. The book starts out by covering the platform in terms of its layers so you can orient yourself with the features that exist at each level and what that means to you as a developer. You will learn how to work inside the data layer to design tables to store data and relationships and manage how it all works together. You will learn how to apply business logic and validation in the business layer to ensure data integrity and enforce process compliance. You will learn how to design interfaces in the presentation layer to allow users to interact with your data and processes in user-friendly applications. And you will learn how to utilize third-party integration tools to create seamless connections between your solution and legacy systems so you can develop enterprise-grade tools in record time. What You Will LearnUnderstand the layers of Dataverse and the features at each layerCreate tables and relationships to store data and manage interactionsBuild applications to allow users to interact with your data using logical interfacesDesign business logic and workflows to ensure data integrity and automationConfigure security to control access to data and prevent unauthorized accessExplore the options for integration with third-party systems Who This Book Is ForMicrosoft Power Platform users who want to learn how to access the power of the Power Platform and leverage Dataverse to build powerful, robust, and resilient tools; power users and citizen developers who are looking for tools to quickly build scalable business solutions that don’t require a strong developer background; pro developers who want to learn how to utilize use the Power Platform to speed up the development cycle and deliver value to customers faster than ever beforeJava Persistence with Hibernate
Par Gary Gregory, Christian Bauer. 2016
SummaryJava Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In…
this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR 338). All examples have been updated for the latest Hibernate and Java EE specification versions.About the TechnologyPurchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.Persistence—the ability of data to outlive an instance of a program—is central to modern applications. Hibernate, the most popular Java persistence tool, offers automatic and transparent object/relational mapping, making it a snap to work with SQL databases in Java applications.About the BookJava Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. You'll immediately dig into the rich programming model of Hibernate, working through mappings, queries, fetching strategies, transactions, conversations, caching, and more. Along the way you'll find a well-illustrated discussion of best practices in database design and optimization techniques. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR 338). All examples have been updated for the latest Hibernate and Java EE specification versions.What's InsideObject/relational mapping conceptsEfficient database application designComprehensive Hibernate and Java Persistence referenceIntegration of Java Persistence with EJB, CDI, JSF, and JAX-RS * Unmatched breadth and depthAbout the ReaderThe book assumes a working knowledge of Java.About the AuthorsChristian Bauer is a member of the Hibernate developer team and a trainer and consultant. Gavin King is the founder of the Hibernate project and a member of the Java Persistence expert group (JSR 220). Gary Gregory is a principal software engineer working on application servers and legacy integration.Table of ContentsPART 1 GETTING STARTED WITH ORMUnderstanding object/relational persistenceStarting a projectDomain models and metadataPART 2 MAPPING STRATEGIESMapping persistent classesMapping value typesMapping inheritanceMapping collections and entity associationsAdvanced entity association mappingsComplex and legacy schemasPART 3 TRANSACTIONAL DATA PROCESSINGManaging dataTransactions and concurrencyFetch plans, strategies, and profilesFiltering dataPART 4 WRITING QUERIESCreating and executing queriesThe query languagesAdvanced query optionsCustomizing SQLUbiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers (Communications in Computer and Information Science #1768)
Par Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani. 2023
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31,…
2022.The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.Semantic Intelligence: Select Proceedings of ISIC 2022 (Lecture Notes in Electrical Engineering #964)
Par Sarika Jain, Sven Groppe, Bharat K. Bhargava. 2023
This book constitutes refereed proceedings of the 2nd International Semantic Intelligence Conference (ISIC 2022). This book covers a wide range…
of topics, including semantic web engineering, ontology-based data access, multimodal and multilingual access, machine-to-machine communications and interoperability, knowledge extraction and ontology learning from the web, computational paradigms and computational intelligence, distributed and mobile systems, and many others. This book includes novel contributions and the latest developments from researchers across industry and academia. This book serves as a valuable reference resource for academics and researchers across the globe.Natural Language Processing and Information Systems: 28th International Conference on Applications of Natural Language to Information Systems, NLDB 2023, Derby, UK, June 21–23, 2023, Proceedings (Lecture Notes in Computer Science #13913)
Par Elisabeth Métais, Farid Meziane, Vijayan Sugumaran, Warren Manning, Stephan Reiff-Marganiec. 2023
This book constitutes the refereed proceedings of the 28th International Conference on Applications of Natural Language to Information Systems, NLDB…
2023, held in Derby, UK, in June 21–23, 2023The 31 full papers and 14 short papers included in this book were carefully reviewed and selected from 89 submissions. They focus on the developments of the application of natural language to databases and information systems in the wider meaning of the term.Introduction to Algorithms, fourth edition
Par Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein. 2022
A comprehensive update of the leading algorithms text, with new material on matchings in bipartite graphs, online algorithms, machine learning,…
and other topics.Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. It covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers, with self-contained chapters and algorithms in pseudocode. Since the publication of the first edition, Introduction to Algorithms has become the leading algorithms text in universities worldwide as well as the standard reference for professionals. This fourth edition has been updated throughout. New for the fourth edition • New chapters on matchings in bipartite graphs, online algorithms, and machine learning • New material on topics including solving recurrence equations, hash tables, potential functions, and suffix arrays • 140 new exercises and 22 new problems • Reader feedback–informed improvements to old problems • Clearer, more personal, and gender-neutral writing style • Color added to improve visual presentation • Notes, bibliography, and index updated to reflect developments in the field • Website with new supplementary materialThe Changing Face of Government Information: Providing Access in the Twenty-First Century
Par Suhasini L. Kumar. 2006
Learn what innovative changes lie in the future of government informationThe Changing Face of Government Information comprehensively examines the way…
government documents&’ librarians acquire, provide access, and provide reference services in the new electronic environment. Noted experts discuss the impact electronic materials have had on the Government Printing Office (GPO), the reference services within the Federal Depository Library Program (FDLP), and the new opportunities in the transition from paper-based information policy to an electronic e-government. This source reveals the latest changes in the field of government documents librarianship and the knowledge and expertise needed to teach users how to access what they need from this enormous wealth of government information.Major changes have taken place in the way government information is created, disseminated, accessed, and preserved. The Changing Face of Government Information explains in detail the tremendous change taking place in libraries and government documents librarianship. Topics include the increasing accessibility to the federally funded technical report literature, information on the Patriot Act&’s effect on the status of libraries in the aftermath of 9/11, the uses of Documents Data Miner©, and information about catalogs, indexes, and full text databases. This book also provides a selective bibliography of print and electronic sources about Native Americans and the Federal Government, as well as specific sources for information about the environment, such as EPA air data, DOE energy information, information on flora and fauna, hazardous waste, land use, and water. Each chapter is extensively referenced and several chapters use appendixes, tables, and charts to ensure understanding of data.This useful book gives readers the opportunity to learn: how the University of Oregon successfully integrated its business reference service and map collection into its government documents collection the results of a survey of FDLP institutions identifying the factors contributing to the reorganization of services details of the pilot project undertaken by the University of Arizona Library along with the United States Government Printing Office&’s Library Programs Service to create a model for a virtual depository library which critical features are missing in today&’s e-government reference service models details of the GPO&’s plans to provide perpetual access to both electronic and tangible information resourcesand the strategies to authenticate government publications on the InternetThe Changing Face of Government Information is stimulating, horizon-expanding reading for librarians, professors, students, and researchers.Routledge International Handbook of Internet Gambling
Par Robert J. Williams, Robert T. Wood, Jonathan Parke. 2012
Internet gambling is a rapidly growing phenomenon, which has profound social, psychological, economic, political, and policy implications. Until recently, Internet…
gambling has been understudied by the research community, but now a growing body of literature is emerging, on all aspects of Internet gambling and its attendant implications. As jurisdictions around the world grapple to understand the best way to respond to Internet gambling from a commercial, regulatory, and social perspective, scholarly studies of Internet gambling are becoming an ever more crucial resource. The Handbook of Internet Gambling consolidates this emerging body of literature into a single reference volume. Its twenty chapters comprise groundbreaking contributions from the world’s leading authorities in the commercial, clinical, political and social aspects of Internet gambling. It is sure to be a foundational resource for academics, students, regulators, politicians, policy makers, commercial providers, and health care professionals who have an interest in understanding the history, dynamics, and impacts of Internet gambling in a global context.This book reviews the latest techniques in exploratory data mining (EDM) for the analysis of data in the social and…
behavioral sciences to help researchers assess the predictive value of different combinations of variables in large data sets. Methodological findings and conceptual models that explain reliable EDM techniques for predicting and understanding various risk mechanisms are integrated throughout. Numerous examples illustrate the use of these techniques in practice. Contributors provide insight through hands-on experiences with their own use of EDM techniques in various settings. Readers are also introduced to the most popular EDM software programs. A related website at http://mephisto.unige.ch/pub/edm-book-supplement/offers color versions of the book’s figures, a supplemental paper to chapter 3, and R commands for some chapters. The results of EDM analyses can be perilous – they are often taken as predictions with little regard for cross-validating the results. This carelessness can be catastrophic in terms of money lost or patients misdiagnosed. This book addresses these concerns and advocates for the development of checks and balances for EDM analyses. Both the promises and the perils of EDM are addressed. Editors McArdle and Ritschard taught the "Exploratory Data Mining" Advanced Training Institute of the American Psychological Association (APA). All contributors are top researchers from the US and Europe. Organized into two parts--methodology and applications, the techniques covered include decision, regression, and SEM tree models, growth mixture modeling, and time based categorical sequential analysis. Some of the applications of EDM (and the corresponding data) explored include: selection to college based on risky prior academic profiles the decline of cognitive abilities in older persons global perceptions of stress in adulthood predicting mortality from demographics and cognitive abilities risk factors during pregnancy and the impact on neonatal development Intended as a reference for researchers, methodologists, and advanced students in the social and behavioral sciences including psychology, sociology, business, econometrics, and medicine, interested in learning to apply the latest exploratory data mining techniques. Prerequisites include a basic class in statistics.Intelligence-Driven Incident Response
Par Rebekah Brown, Scott J. Roberts. 2023
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers…
and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.In three parts, this in-depth book includes:The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work togetherPractical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and DisseminateThe way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building