19 results
Search Results
2. Interdisciplinary Approaches to Adaptive Learning: A Look at the Neighbours : First International Conference on Interdisciplinary Research on Technology, Education and Communication, ITEC 2010, Kortrijk, Belgium, May 25-27, 2010. Revised Selected Papers
- Author
-
Stefan De Wannemacker, Geraldine Clarebout, Patrick De Causmaecker, Stefan De Wannemacker, Geraldine Clarebout, and Patrick De Causmaecker
- Subjects
- Computer science, Computer Communication Networks, Multimedia systems, Artificial intelligence, Education
- Abstract
This book constitutes the refereed proceedings of the First International Conference on Interdisciplinary Research on Technology, Education and Communication, ITEC 2010, held in Kortrijk, Belgium, in May 2010. The 11 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers address all current issues within the fields of computer sciences, applied linguistics, methodology, and educational technology with special emphasis on topics such as distributed decision support, agent based systems, heuristic optimization, heuristics for data mining, distributed search, pervasive learning, mobile learning electronic language learning environments, language testing, CorpusCALL, authoring systems statistical modelling, item response theory, data mining, electronic assessment adaptive and adaptable learning environments, instructional design, game-based learning, learner characteristics, mobile learning.
- Published
- 2011
3. Quantum Communication and Quantum Networking : First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers
- Author
-
Alexander Sergienko, Saverio Pascazio, Paolo Villoresi, Alexander Sergienko, Saverio Pascazio, and Paolo Villoresi
- Subjects
- Computer Communication Networks, Data encryption (Computer science), Computer hardware, Quantum theory, Software engineering, Computer science
- Abstract
QUANTUMCOMM 2009––the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)––took place in Vico Equense near Naples, Italy, during October 26–30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.
- Published
- 2010
4. Advances in Computer Entertainment : 9th International Conference, ACE 2012, Kathmandu, Nepal, November 3-5, 2012, Proceedings
- Author
-
Anton Nijholt, Teresa Romão, Dennis Reidsma, Anton Nijholt, Teresa Romão, and Dennis Reidsma
- Subjects
- Computer science, Computer Communication Networks, Computer software, Computer vision
- Abstract
This book constitutes the refereed conference proceedings of the 9th International Conference on Advances in Computer Entertainment, ACE 2012, held in Kathmandu, Nepal, in November 2012. The 10 full paper and 19 short papers presented together with 5 papers from the special track Arts and Culture and 35 extended abstracts were carefully reviewed and selected from a total of 140 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including computer science, design, arts, sociology, anthropology, psychology, and marketing. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.
- Published
- 2012
5. Software Composition : 10th International Conference, SC 2011, Zurich, Switzerland, June 30 - July 1, 2011, Proceedings
- Author
-
Sven Apel, Ethan Jackson, Sven Apel, and Ethan Jackson
- Subjects
- Computer science, Computer Communication Networks, Software engineering--Congresses, Logic design
- Abstract
The book constitutes the refereed proceedings of the 10th International Conference on Software Composition, SC 2011, held in Zurich, Switzerland, in June/July 2011, co-located with TOOLS 2011 Federated Conferences. The 10 revised full papers and 2 short papers were carefully reviewed and selected from 32 initial submissions for inclusion in the book. The papers reflect all current research in software composition and are organized in topical sections on composition and interfaces, aspects and features, and applications.
- Published
- 2011
6. Cyber Security
- Author
-
Lu, Wei, Wen, Qiaoyan, Zhang, Yuqing, Lang, Bo, Wen, Weiping, Yan, Hanbing, Li, Chao, Ding, Li, Li, Ruiguang, and Zhou, Yu
- Subjects
Systems and Data Security ,Computer Communication Networks ,Information Systems Applications (incl. Internet) ,Computer System Implementation ,Cryptology ,Mobile and Network Security ,Data and Information Security ,Computer and Information Systems Applications ,communication channels (information theory) ,communication systems ,computer crime ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data communication systems ,data security ,databases ,network protocols ,network security ,sensors ,signal processing ,telecommunication networks ,telecommunication systems ,telecommunication traffic ,wireless telecommunication systems ,Network hardware ,Information retrieval ,Internet searching ,Systems analysis & design ,Coding theory & cryptology ,Data encryption ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security - Abstract
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
- Published
- 2020
- Full Text
- View/download PDF
7. The Impact of Digital Technologies on Public Health in Developed and Developing Countries
- Author
-
Jmaiel, Mohamed, Mokhtari, Mounir, Abdulrazak, Bessam, Aloulou, Hamdi, and Kallel, Slim
- Subjects
Computer Communication Networks ,Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Special Purpose and Application-Based Systems ,Computer System Implementation ,User Interfaces and Human Computer Interaction ,Computer and Information Systems Applications ,open access ,artificial intelligence ,communication systems ,computer vision ,databases ,hci ,human-computer interaction ,image processing ,Internet of Things ,IoT ,machine learning ,network protocols ,sensors ,signal processing ,software architecture ,software design ,telecommunication networks ,telecommunication systems ,user interfaces ,wireless telecommunication systems ,Network hardware ,Artificial intelligence ,Information retrieval ,Internet searching ,Expert systems / knowledge-based systems ,Systems analysis & design ,User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability - Abstract
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
- Full Text
- View/download PDF
8. Strictly Nonblocking Operation of 3-stage Clos Switching Networks
- Author
-
Liotopoulos, Fotios K., Chalasani, Suresh, and Kouvatsos, Demetres D., editor
- Published
- 1996
- Full Text
- View/download PDF
9. Testing using Telecommunications Management
- Author
-
van Wuijtswinkel, Ronald C., Witteman, Marc F., Mizuno, Tadanori, editor, Higashino, Teruo, editor, and Shiratori, Norio, editor
- Published
- 1995
- Full Text
- View/download PDF
10. Graph Structures for Knowledge Representation and Reasoning
- Author
-
Cochez, Michael, Croitoru, Madalina, Marquis, Pierre, and Rudolph, Sebastian
- Subjects
Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Computer Communication Networks ,Mathematical Logic and Formal Languages ,Computer and Information Systems Applications ,Formal Languages and Automata Theory ,open access ,concept lattices ,data mining ,databases ,fca ,formal concept analysis ,formal languages ,formal logic ,information analysis ,information systems ,knowledge-based system ,model-based reasoning ,network protocols ,ontologies ,Information retrieval ,Internet searching ,Network hardware ,Mathematical theory of computation ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science - Abstract
This open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 7 revised full papers presented together with 2 invited contributions were reviewed and selected from 9 submissions. The contributions address various issues for knowledge representation and reasoning and the common graph-theoretic background, which allows to bridge the gap between the different communities.
- Published
- 2021
- Full Text
- View/download PDF
11. High-Performance Modelling and Simulation for Big Data Applications : Selected Results of the COST Action IC1406 CHiPSet
- Author
-
Joanna Kołodziej, Horacio González-Vélez, Joanna Kołodziej, and Horacio González-Vélez
- Subjects
- Computer science, Computer Communication Networks, Computer system performance, Operating systems (Computers), Logic design
- Abstract
This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.
- Published
- 2019
12. Autonomic Computing Enabled Cooperative Networked Design
- Author
-
Michał Wódczak and Michał Wódczak
- Subjects
- Computer Communication Networks, Computer networks, Autonomic computing, Computer science
- Abstract
This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inclusion of certain Decision Making Entities, but it also provides all the necessary implementation guidelines along with the pertinent standardisation orientated insight.
- Published
- 2014
13. Spyware and Adware
- Author
-
John Aycock and John Aycock
- Subjects
- Data protection, Data structures (Computer science), Data encryption (Computer science), Computer science, Computer network architectures, Computer Communication Networks, Information systems, Computer Systems Organization and Communication Ne, Data Structures, Cryptology and Information Theory, Systems and Data Security, Data Encryption, Information Systems Applications (incl. Internet)
- Abstract
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
- Published
- 2011
14. Dissemination of Information in Optical Networks: : From Technology to Algorithms
- Author
-
Subir Bandyopadhyay and Subir Bandyopadhyay
- Subjects
- Computer software, Computer programs, Computer Communication Networks, Telecommunication, Information theory
- Abstract
Optical networks and the related technologies, network management software and services have undergone remarkable developments, and such networks are now the ultra-high-speed backbone networks for communication. Wavelength-Division Multiplexing (WDM), the ability to support multiple communication pathways over the same fiber, enables efficient use of the enormous capability for data communication of optical networks. This book gives a broad overview of techniques used in the design of WDM networks for efficient dissemination of information in computer networks. It starts with an overview of the hardware components, then provides a thorough review of WDM, wavelength-routed networks, algorithms for route and wavelength assignment, design of broadcast and select networks, logical topology design, and techniques to handle faults and algorithms for efficient use of optical networks. Each topic has been covered rigorously with emphasis on detailed explanations of the approaches used, starting from the fundamentals up to the state of the art. The optimization techniques covered in the book include graph-theoretic algorithms, mixed-integer linear programming and heuristics. The book is intended for beginners as well as for specialists, and the reader should be able to design WDM networks and follow developments in the field. Each chapter contains a detailed, annotated bibliography. There are numerous exercises for the reader to test understanding of the subject, while readers unfamiliar with mathematical programming techniques and network flow optimization are offered short, easy-to-understand appendices at the end of the book.
- Published
- 2008
15. Multiagent Systems for Manufacturing Control : A Design Methodology
- Author
-
Stefan Bussmann, Nicolas R. Jennings, Michael Wooldridge, Stefan Bussmann, Nicolas R. Jennings, and Michael Wooldridge
- Subjects
- Artificial intelligence, Computer science, Computer Communication Networks, Software engineering
- Abstract
The ability of production companies to rapidly develop and deploy effective and efficient control systems is critical for success in the consumer-driven environment of contemporary manufacturing. This book presents a novel approach to the design of manufacturing control systems, based around the idea of agents, semiautonomous decision makers that cooperate to process goods and meet orders. This new methodology is DACS – Designing Agent-based Control Systems. Developed at DaimlerChrysler's research labs in Berlin, DACS is the first methodology specifically produced for the design of agent-based control systems. Beginning with a detailed overview of agent technologies, manufacturing control, and design methodologies, the book explains the DACS methodology and illustrates it by way of detailed case studies. The book will be of interest to researchers and practitioners in agent systems, manufacturing control, and software methodologies.
- Published
- 2004
16. Learning and Generalisation : With Applications to Neural Networks
- Author
-
Mathukumalli Vidyasagar and Mathukumalli Vidyasagar
- Subjects
- Group theory, Systems theory, Engineering, Computer Communication Networks, Distribution (Probability theory), Engineering mathematics
- Abstract
Learning and Generalization provides a formal mathematical theory addressing intuitive questions of the type: • How does a machine learn a concept on the basis of examples? • How can a neural network, after training, correctly predict the outcome of a previously unseen input? • How much training is required to achieve a given level of accuracy in the prediction? • How can one identify the dynamical behaviour of a nonlinear control system by observing its input-output behaviour over a finite time? The second edition covers new areas including: • support vector machines; • fat-shattering dimensions and applications to neural network learning; • learning with dependent samples generated by a beta-mixing process; • connections between system identification and learning theory; • probabilistic solution of'intractable problems'in robust control and matrix theory using randomized algorithms. It also contains solutions to some of the open problems posed in the first edition, while adding new open problems.
- Published
- 2003
17. Communications and Networking in Education : Learning in a Networked Society
- Author
-
Deryn M. Watson, Toni Downes, Deryn M. Watson, and Toni Downes
- Subjects
- Computer communication networks, Education, Multimedia systems, Computer science
- Abstract
In most schools the dominant supporting technology has been either the stand-alone personal computer or a modest local network. The situation is changing rapidly as a rising number of schools provide access to the Internet for their staff and pupils, opening avenues for communication and networking hitherto not possible. This book reflects on this change. It aims to further the vision of how these new technologies could improve and transform aspects of education. Yet in parallel it asks serious questions about the realities of an interface between the social, cultural and pedagogical contexts of education and the actual affordances that these new information and communication technologies offer. The chapters in this book provide a heady mix of foresight and practical reporting, of planning for the future but at the same time respecting the problems education already has with current technologies. The richness of the points presented here stems in part from the range of experience of the international authors - from academics and administrators, to teachers and curriculum designers. This mix ensures that the central questions on communications and networking in education are considered not simply from a variety of personal perspectives, but also from different cultural and environmental experiences. And yet interest also lies in the commonality of reporting and discussion based on activity in the field. All the contributions draw heavily on research and experience in devising and running projects and experimental activities in a range of schools and teacher-training institutions and environments. The opinions expressed are thus grounded in knowledge gained from work embedded in the reality of today's educational settings. This must be the only sound base upon which to consider the issues of the future. This book is essential reading for all professionals involved in all aspects of information and communication technologies in education. Teachers, lecturers, researchers, students and administrators will find it invaluable.
- Published
- 2000
18. Open Systems in Medicine
- Author
-
E. Fleck and E. Fleck
- Subjects
- Medical informatics, Telecommunication in medicine, OSI (Computer network standard), Information storage and retrieval systems--Medic, Information storage and retrieval systems--Hospi, Medical Records Systems, Computerized, Integrated Advanced Information Management Systems, Computer Communication Networks, Online Systems
- Abstract
This book discusses information processing and communication in medicine, with the aim to improve quality in healthcare and diagnoses. By object-oriented analysis, modelling and design, the approach enables a development according to the needs of the medical environment. Following this approach, medical applications are realised using a heterogeneous distributed information management system. This system provides integration and communication of multimedia information for medical services. The book includes a contribution on medical terminology in clinical applications. The integrated hospital systems and the telemedicine services are well described and there is an interesting account on digital signal processing. It forms an important record of a major contribution in the evolution of health informatics and discusses information processing and communication in medicine and it presents a different approach.
- Published
- 1993
19. Error-Correction Coding for Digital Communications
- Author
-
George C. Clark Jr, J. Bibb Cain, George C. Clark Jr, and J. Bibb Cain
- Subjects
- Computer Communication Networks, Engineering, Computer engineering, Computer organization
- Abstract
Error-correction coding is being used on an almost routine basis in most new communication systems. Not only is coding equipment being used to increase the energy efficiency of communication links, but coding ideas are also providing innovative solutions to many related communication problems. Among these are the elimination of intersymbol interference caused by filtering and multipath and the improved demodulation of certain frequency modulated signals by taking advantage of the'natural'coding provided by a continuous phase. Although several books and nu merous articles have been written on coding theory, there are still noticeable deficiencies. First, the practical aspects of translating a specific decoding algorithm into actual hardware have been largely ignored. The information that is available is sketchy and is widely dispersed. Second, the information required to evaluate a particular technique under situations that are en countered in practice is available for the most part only in private company reports. This book is aimed at correcting both of these problems. It is written for the design engineer who must build the coding and decoding equipment and for the communication system engineer who must incorporate this equipment into a system. It is also suitable as a senior-level or first-year graduate text for an introductory one-semester course in coding theory. The book U'Ses a minimum of mathematics and entirely avoids the classical theorem/proof approach that is often seen in coding texts.
- Published
- 1981
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.