Search preferences

Tipo di articolo

Condizioni

Legatura

Ulteriori caratteristiche

  • Prima ed.
  • Copia autograf.
  • Sovracoperta
  • Con foto (7)
  • Non Print on Demand

Spedizione gratuita

  • Spedizione gratuita negli USA

Paese del venditore

Valutazione venditore

  • William Jones

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 3031011503ISBN 13: 9783031011504

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -We are well into a second age of digital information. Our information is moving from the desktop to the laptop to the 'palmtop' and up into an amorphous cloud on the Web. How can one manage both the challenges and opportunities of this new world of digital information What does the future hold This book provides an important update on the rapidly expanding field of personal information management (PIM). Part I (Always and Forever) introduces the essentials of PIM. Information is personal for many reasons. It's the information on our hard drives we couldn't bear to lose. It's the information about us that we don't want to share. It's the distracting information demanding our attention even as we try to do something else. It's the information we don't know about but need to. Through PIM, we control personal information. We integrate information into our lives in useful ways. We make it 'ours.' With basics established, Part I proceeds to explore a critical interplay between personal information 'always' at hand through mobile devices and 'forever' on the Web. How does information stay 'ours' in such a world Part II (Building Places of Our Own for Digital Information) will be available in the Summer of 2012, and will consist of the following chapters: Chapter 5. Technologies to eliminate PIM : We have seen astonishing advances in the technologies of information management -- in particular, to aid in the storing, structuring and searching of information. These technologies will certainly change the way we do PIM; will they eliminate the need for PIM altogether Chapter 6. GIM and the social fabric of PIM: We don't (and shouldn't) manage our information in isolation. Group information management (GIM) -- especially the kind practiced more informally in households and smaller project teams -- goes hand in glove with good PIM. Chapter 7. PIM by design: Methodologies, principles, questions and considerations as we seek to understand PIM better and to build PIM into our tools, techniques and training. Chapter 8. To each of us, our own.: Just as we must each be a student of our own practice of PIM, we must also be a designer of this practice. This concluding chapter looks at tips, traps and tradeoffs as we work to build a practice of PIM and 'places' of our own for personal information. Table of Contents: A New Age of Information / The Basics of PIM / Our Information, Always at Hand / Our Information, Forever on the Web 204 pp. Englisch.

  • Elena Zheleva

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 3031007735ISBN 13: 9783031007736

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive information. Next, we describe some privacy definitions and privacy mechanisms for data publishing. Finally, we describe a set of recent techniques for modeling, evaluating, and managing individual users' privacy risk within the context of OSNs. Table of Contents: Introduction / A Model for Online Social Networks / Types of Privacy Disclosure / Statistical Methods for Inferring Information in Networks / Anonymity and Differential Privacy / Attacks and Privacy-preserving Mechanisms / Models of Information Sharing / Users' Privacy Risk / Management of Privacy Settings 108 pp. Englisch.

  • Carolotta Berry

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 3031007026ISBN 13: 9783031007026

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This lecture provides an introduction to the field of mobile robotics and the intersection between multiple robotics-related disciplines including electrical, mechanical, computer, software engineering and computer science. It is intended for an upper-level undergraduate or first-year graduate students interested in mobile robotics and artificial intelligence with some experience in object-oriented programming and controls. Focus areas will include robotics history, hardware, control and software. Specific topics include robot components, effectors and actuators, locomotion, kinematics, sensors, feedback control, control architectures, representation, navigation, localization and mapping. The end of each chapter includes review questions as well as exercises to provide applications for the concepts as well as opportunities for further study.Table of Contents: Introduction / Hardware / Control / Software 96 pp. Englisch.

  • Bonnie Nardi

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 303101068XISBN 13: 9783031010682

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Activity theory -- a conceptual framework originally developed by Aleksei Leontiev -- has its roots in the socio-cultural tradition in Russian psychology. The foundational concept of the theory is human activity, which is understood as purposeful, mediated, and transformative interaction between human beings and the world. Since the early 1990s, activity theory has been a visible landmark in the theoretical landscape of Human-Computer Interaction (HCI). Along with some other frameworks, such as distributed cognition and phenomenology, it established itself as a leading post-cognitivist approach in HCI and interaction design. In this book we discuss the conceptual foundations of activity theory and its contribution to HCI research. After making the case for theory in HCI and briefly discussing the contribution of activity theory to the field (Chapter One) we introduce the historical roots, main ideas, and principles of activity theory (Chapter Two). After that we present in-depth analyses of three issues which we consider of special importance to current developments in HCI and interaction design, namely: agency (Chapter Three), experience (Chapter Four), and activity-centric computing (Chapter Five). We conclude the book with reflections on challenges and prospects for further development of activity theory in HCI (Chapter Six). Table of Contents: Introduction: Activity theory and the changing face of HCI / Basic concepts and principles of activity theory / Agency / Activity and experience / Activity-centric computing / Activity theory and the development of HCI 136 pp. Englisch.

  • Esther Pacitti

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 3031007603ISBN 13: 9783031007606

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -As an alternative to traditional client-server systems, Peer-to-Peer (P2P) systems provide major advantages in terms of scalability, autonomy and dynamic behavior of peers, and decentralization of control. Thus, they are well suited for large-scale data sharing in distributed environments. Most of the existing P2P approaches for data sharing rely on either structured networks (e.g., DHTs) for efficient indexing, or unstructured networks for ease of deployment, or some combination. However, these approaches have some limitations, such as lack of freedom for data placement in DHTs, and high latency and high network traffic in unstructured networks. To address these limitations, gossip protocols which are easy to deploy and scale well, can be exploited. In this book, we will give an overview of these different P2P techniques and architectures, discuss their trade-offs, and illustrate their use for decentralizing several large-scale data sharing applications. Table of Contents: P2P Overlays, Query Routing, and Gossiping / Content Distribution in P2P Systems / Recommendation Systems / Top-k Query Processing in P2P Systems 108 pp. Englisch.

  • Kian-Lee Tan

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 303100759XISBN 13: 9783031007590

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion 104 pp. Englisch.

  • Ronald Terry

    Editore: Springer International Publishing Apr 2012, 2012

    ISBN 10: 3031793471ISBN 13: 9783031793479

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione venditore: 5 stelle, Learn more about seller ratings

    Contatta il venditore

    Libro Print on Demand

    EUR 23,00 Spese di spedizione

    Da: Germania a: U.S.A.

    Quantità: 2

    Aggiungere al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The authors cover two general topics: basic engineering economics and risk analysis in this text. Within the topic of engineering economics are discussions on the time value of money and interest relationships. These interest relationships are used to define certain project criteria that are used by engineers and project managers to select the best economic choice among several alternatives. Projects examined will include both income- and service-producing investments. The effects of escalation, inflation, and taxes on the economic analysis of alternatives are discussed. Risk analysis incorporates the concepts of probability and statistics in the evaluation of alternatives. This allows management to determine the probability of success or failure of the project. Two types of sensitivity analyses are presented. The first is referred to as the range approach while the second uses probabilistic concepts to determine a measure of the risk involved. The authors have designed the text to assist individuals to prepare to successfully complete the economics portions of the Fundamentals of Engineering Exam.Table of Contents: Introduction / Interest and the Time Value of Money / Project Evaluation Methods / Service Producing Investments / Income Producing Investments / Determination of Project Cash Flow / Financial Leverage / Basic Statistics and Probability / Sensitivity Analysis 220 pp. Englisch.