top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and communication technology [electronic resource] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / Khabib Mustofa...[et al.] (eds.).
Information and communication technology [electronic resource] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / Khabib Mustofa...[et al.] (eds.).
Creatore [ICT-EurAsia 2013 (2013 : Yogyakarta, Indonesia)]
Estensione 1 online resource.
Disciplina 004.6
Accesso persona Mustofa, Khabib
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information storage and retrieval systems
Computers and Society
Systems and Data Security
Information Systems Applications (incl. Internet)
ISBN 9783642368189 (electronic bk.)
3642368182 (electronic bk.)
3642368174 (print)
9783642368172 (print)
9783642368172
Classificazione 54.81
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information and Communication Technology- Eurasia Conference (ICT-EurAsia). E-Society. Translating the Idea of the eGovernment One-Stop-Shop in Indonesia / Fathul Wahid -- A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network / Thi Ai Thao Nguyen, Tran Khanh Dang -- Early-Detection System for Cross-Language (Translated) Plagiarism / Khabib Mustofa, Yosua Albert Sir -- TransWiki: Supporting Translation Teaching / Robert P. Biuk-Aghai, Hari Venkatesan -- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework / Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra -- Software Engineering. Software Development Methods in the Internet of Things / Selo Sulistyo -- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications / Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki -- OSMF: A Framework for OSS Process Measurement / Wikan Danar Sunindyo, Fajar Juang Ekaputra -- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs / Susmit Bagchi -- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning / Suprapto, Retantyo Wardoyo --
Security and Privacy. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries / Chan Nam Ngo, Tran Khanh Dang -- Semantic-Aware Obfuscation for Location Privacy at Database Level / Thu Thi Bao Le, Tran Khanh Dang -- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch / Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang -- CAPTCHA Suitable for Smartphones / Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura -- Code Based KPD Scheme with Full Connectivity: Deterministic Merging / Pinaki Sarkar, Aritra Dhar -- Cloud and Internet Computing. Indonesian Digital Natives / Neila Ramdhani, Wisnu Wiradhany -- End-to-End Delay Performance for VoIP on LTE System in Access Network / Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan -- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required? / Faisal Syafar, Jing Gao --
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud / Nguyen Quang-Hung ... [et al.] -- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution / Nungki Selviandro, Zainal Arifin Hasibuan -- Knowledge Management. Information Systems Strategic Planning for a Naval Hospital / Hery Harjono Muljo, Bens Pardamean -- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique / Wayan Suparta, Kemal Maulana Alhasa -- A Data-Driven Approach toward Building Dynamic Ontology / Dhomas Hatta Fudholi ... [et al.] -- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Muhammad Asfand-e-yar, A Min Tjoa -- Asian Conference on Availability, Reliability and Security (AsiaARES). Dependable Systems and Applications. Secure and Verifiable Outsourcing of Sequence Comparisons / Yansheng Feng ... [et al.] -- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter / Dongjin Choi, Ilsun You, Pankoo Kim --
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) / Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki -- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation / Huabiao Lu ... [et al.] -- On Identifying Proper Security Mechanisms / Jakub Breier, Ladislav Hudec -- A Recovery Approach for SQLite History Recorders from YAFFS2 / Beibei Wu ... [et al.] -- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors / Yuchao She, Hui Li, Hui Zhu -- SA4WSs: A Security Architecture for Web Services / Lingxia Liu ... [et al.] -- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation / Shuhui Hou ... [et al.] -- A Test Case Generation Technique for VMM Fuzzing / Xiaoxia Sun ... [et al.] -- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet / Thach V. Bui ... [et al.] -- A Proposal on Security Case Based on Common Criteria / Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka --
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors / Wentao Jia, Rui Li, Chunyan Zhang -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks / Jostein Jensen -- Cryptography. Anonymous Lattice-Based Broadcast Encryption / Adela Georgescu -- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance / Amril Syalim, Takashi Nishide, Kouichi Sakurai -- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation / Xingxing Xie ... [et al.] -- Provably Secure and Subliminal-Free Variant of Schnorr Signature / Yinghui Zhang ... [et al.] -- A Block Cipher Mode of Operation with Two Keys / Yi-Li Huang ... [et al.] -- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing / Ruxandra F. Olimid -- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme / Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong -- Privacy and Trust Management. A Simplified Privacy Preserving Message Delivery Protocol in VDTNs / Youngho Park, Chul Sur, Kyung-Hyune Rhee --
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data / Anis Bkakria ... [et al.] -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control / Nisreen Alam Aldeen, Gerald Quirchmayr -- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol / Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani -- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution / Bo Liu ... [et al.] -- Network Analysis and Security. CSP-Based General Detection Model of Network Covert Storage Channels / Hui Zhu ... [et al.] -- Trustworthy Opportunistic Access to the Internet of Services / Alessandro Armando ... [et al.] -- Architecture of Network Environment for High-Risk Security Experimentation / Xiaohui Kuang, Xiang Li, Jinjing Zhao -- Emulation on the Internet Prefix Hijacking Attack Impaction / Jinjing Zhao, Yan Wen --
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction / Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim -- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge / Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs / Huaqing Wen, Kyung-Hyune Rhee -- A Review of Security Attacks on the GSM Standard / Giuseppe Cattaneo ... [et al.] -- Multimedia Security. An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation / Huan Wang, Mingxing He, Xiao Li -- Image Watermarking Using Psychovisual Threshold over the Edge / Nur Azman Abu ... [et al.] -- A Data Structure for Efficient Biometric Identification / Kensuke Baba, Serina Egawa -- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System / Hae-Min Moon, Sung Bum Pan -- Shifting Primes on OpenRISC Processors with Hardware Multiplier / Leandro Marin, Antonio J. Jara, Antonio Skarmeta.
Record Nr. UPENN-9960105043503681
[ICT-EurAsia 2013 (2013 : Yogyakarta, Indonesia)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Product-focused software process improvement [electronic resource] : 14th International Conference, PROFES 2013, Paphos, Cyprus, June 12-14, 2013. Proceedings / Jens Heidrich...[et al.] (eds.).
Product-focused software process improvement [electronic resource] : 14th International Conference, PROFES 2013, Paphos, Cyprus, June 12-14, 2013. Proceedings / Jens Heidrich...[et al.] (eds.).
Creatore [PROFES 2013 (2013 : Paphos, Cyprus)]
Estensione 1 online resource.
Disciplina 005.1
Accesso persona Heidrich, Jens
Genere/Forma Electronic books
Soggetto non controllato Computer science
Software engineering
Computer simulation
Information systems
Management information systems
Management of Computing and Information Systems
Computers and Society
Computer Appl. in Administrative Data Processing
Simulation and Modeling
Business Information Systems
ISBN 9783642392597 (electronic bk.)
3642392598 (electronic bk.)
9783642392580
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UPENN-9960107523503681
[PROFES 2013 (2013 : Paphos, Cyprus)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Computational social networks [electronic resource] : tools, perspectives and applications / Ajith Abraham, Aboul-Ella Hassanien, editors
Computational social networks [electronic resource] : tools, perspectives and applications / Ajith Abraham, Aboul-Ella Hassanien, editors
Estensione 1 online resource.
Disciplina 302.30285
Accesso persona Abraham, Ajith, 1968-
Hassanien, Aboul Ella
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Database management
User Interfaces and Human Computer Interaction
Computers and Society
ISBN 9781447140481 (electronic bk.)
1447140486 (electronic bk.)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Modeling and Tools -- Computational Social Networks: Tools, Perspectives, and Challenges / Mrutyunjaya Panda, Nashwa El-Bendary, Mostafa A. Salama, Aboul Ella Hassanien and Ajith Abraham -- Hierarchical Graphical Models for Social and Behavioral Analysis and Forecasting / Jian-Wu Xu -- Social Network Analysis Techniques for Social-Oriented Mobile Communication Networks / Guillaume-Jean Herbiet and Pascal Bouvry -- Detection and Interpretation of Communities in Complex Networks: Practical Methods and Application / Vincent Labatut and Jean-Michel Balasque -- Metrics and Models for Social Networks / Nicolás Ignacio Bersano-Méndez, Satu Elisa Schaeffer and Javier Bustos-Jiménez -- Structural Decompositions of Complex Networks / Rong Yang, Leyla Zhuhadar and Olfa Nasraoui -- Enhancing Online Communities with Cycle-Sharing for Social Networks / Nuno Apolónia, Paulo Ferreira and Luís Veiga -- Centrality Robustness and Link Prediction in Complex Social Networks / Søren Atmakuri Davidsen and Daniel Ortiz-Arroyo -- Part 2. Applications -- Social Networking Tools for Knowledge-Based Action Groups / William P. Hall, Susu Nousala, Russell Best and Siddharth Nair -- Dynamic Web Prediction Using Asynchronous Mouse Activity / Anirban Kundu -- PPMN: A City Wide Reliable Public Wireless Mesh Network / Ali Asghar Khodaparast and Azade Kavianfar -- Applications of Social Networks in Peer-to-Peer Networks / Jiaqing Huang, Qingyuan Liu, Zhibin Lei and Dah Ming Chiu -- Intelligent Social Network of Devices / Arpan Pal, Chirabrata Bhaumik, Priyanka Sinha and Avik Ghose -- Social Network-Based Media Sharing in the Ubiquitous Environment: Technologies and Applications / Xun Luo -- Customer Interaction Management Goes Social: Getting Business Processes Plugged in Social Networks / Michaela Geierhos and Mohamed Ebrahim -- Real Emotions for Simulated Social Networks / Pietro Cipresso, Luigi Sellitti, Nadia El Assawy, Federica Galli and Anna Balgera, et al. -- Social Networks for Learning: Breaking Through the Walled Garden of the VLE / Karen Jones, Rhian Pole, Stephen Hole and James Williams -- Social Networks and Recommender Systems: A World of Current and Future Synergies / Kanna Al Falahi, Nikolaos Mavridis and Yacine Atif.
Record Nr. DUKE-005664288
Materiale a stampa
Lo trovi qui: Duke University
Algorithmic game theory : 4th international symposium, SAGT 2011, Amalfi, Italy, October 17-19, 2011 : proceedings / Giuseppe Persiano (ed.).
Algorithmic game theory : 4th international symposium, SAGT 2011, Amalfi, Italy, October 17-19, 2011 : proceedings / Giuseppe Persiano (ed.).
Creatore [SAGT (Symposium) (4th : 2011 : Amalfi, Italy)]
Estensione 1 online resource (xi, 325 pages) : illustrations (some color).
Disciplina 519.3
Accesso persona Persiano, Giuseppe
Soggetto non controllato Computer science
Electronic data processing
Computer simulation
Simulation and Modeling
e-Commerce/e-business
Models and Principles
Computers and Society
Numeric Computing
Probability and Statistics in Computer Science
ISBN 9783642248290
3642248292
3642248284
9783642248283
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9386677
[SAGT (Symposium) (4th : 2011 : Amalfi, Italy)]  
Materiale a stampa
Lo trovi qui: Stanford University
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.).
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.).
Creatore [International Workshop on Security Protocols (19th : 2011 : Cambridge, England)]
Estensione 1 online resource (ix, 380 pages).
Disciplina 005.8
Accesso persona Christianson, Bruce
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 9783642258671
3642258670
9783642258664
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Alice Doesn't Live Here Anymore (Transcript) / Bruce Christianson -- His Late Master's Voice: Barking for Location Privacy / Mike Burmester -- His Late Master's Voice (Transcript of Discussion) / Mike Burmester -- Can We Fix the Security Economics of Federated Authentication? / Ross Anderson -- Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion) / Ross Anderson -- Pico: No More Passwords! / -- Pico: No More Passwords! (Transcript of Discussion) / Frank Stajano -- Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords / Joseph Bonneau -- Getting Web Authentication Right (Transcript of Discussion) / Joseph Bonneau -- When Context Is Better Than Identity: Authentication / Context Using Empirical Channels / Bangdao Chen, Long Hoang Nguyen and Andrew William Roscoe -- When Context Is Better Than Identity (Transcript of Discussion) / Bangdao Chen -- Selective Location Blinding Using Hash Chains / Gabriele Lenzini, Sjouke Mauw and Jun Pang -- Selective Location Blinding Using Hash Chains (Transcript of Discussion) / Sjouke Mauw -- Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces / Alf Zugenmaier -- Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion) / Alf Zugenmaier -- How to Sync with Alice / Feng Hao and Peter Y.A. Ryan -- How to Sync with Alice (Transcript of Discussion) / Feng Hao -- Attack Detection vs. Privacy -- How to Find the Link or How to Hide It? / Jiérí Kůr, Vashek Matyáš, Andriy Stetsko and Petr Švenda -- Attack Detection vs Privacy -- How to Find the Link or How to Hide It (Transcript of Discussion) / Jiérí Kůr and Andriy Stetsko -- The Sense of Security and a Countermeasure for the False Sense / Yuko Murayama, Yasuhiro Fujihara and Dai Nishioka -- The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion) / James Malcolm -- Towards a Theory of Trust in Networks of Humans and Computers / Virgil Gligor and Jeannette M. Wing -- Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion) / Virgil Gligor -- Gearing Up: How to Eat Your Cryptocake and Still Have It / Alex Shafarenko and Bruce Christianson -- Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion) / Alex Shafarenko -- Make Noise and Whisper: A Solution to Relay Attacks / Omar Choudary and Frank Stajano -- Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion) / Omar Choudary -- Scrambling for Lightweight Censorship Resistance / Joseph Bonneau and Rubin Xu -- Scrambling for Lightweight Censorship Resistance (Transcript of Discussion) / Rubin Xu -- The Metaplace Security Model / Michael Roe -- The Metaplace Security Model (Transcript of Discussion) / Michael Roe -- One-Way Cryptography / Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu, et al. -- One-Way Cryptography (Transcript of Discussion) / Matt Blaze -- How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort) / Jonathan Anderson, Frank Stajano and Robert N.M. Watson -- How to Keep Bad Papers Out of Conferences (Transcript of Discussion) / Jonathan Anderson.
Record Nr. STANFORD-a9504079
[International Workshop on Security Protocols (19th : 2011 : Cambridge, England)]  
Materiale a stampa
Lo trovi qui: Stanford University
Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Creatore [Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (2011 : Saarbrücken, Germany)]
Estensione 1 online resource (vi, 224 pages) : illustrations.
Disciplina 005.8
Accesso persona Mödersheim, Sebastian
Palamidessi, Catuscia
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data encryption (Computer science)
Computer software
Computers and Society
Algorithm Analysis and Problem Complexity
Programming Languages, Compilers, Interpreters
ISBN 9783642273759
3642273750
9783642273742
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9518531
[Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (2011 : Saarbrücken, Germany)]  
Materiale a stampa
Lo trovi qui: Stanford University
Diagrammatic representation and inference : 7th International Conference, Diagrams 2012, Canterbury, UK, July 2-6, 2012. Proceedings / Philip Cox, Beryl Plimmer, Peter Rodgers (eds.).
Diagrammatic representation and inference : 7th International Conference, Diagrams 2012, Canterbury, UK, July 2-6, 2012. Proceedings / Philip Cox, Beryl Plimmer, Peter Rodgers (eds.).
Creatore [Diagrams (Conference) (7th : 2012 : Canterbury, England)]
Estensione 1 online resource (xiii, 358 pages) : illustrations.
Disciplina 006.6
Accesso persona Cox, Philip (Phil)
Plimmer, Beryl
Rodgers, Peter
Soggetto non controllato Computer science
Computational complexity
Artificial intelligence
Computer graphics
User Interfaces and Human Computer Interaction
Information Systems Applications (incl. Internet)
Computers and Society
Discrete Mathematics in Computer Science
ISBN 9783642312236
3642312233
3642312225
9783642312229
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Life on the Line: Interacting with Temporal Event Sequence Representations / Catherine Plaisant -- Learning to Use the Openbox: A Framework for the Implementation of Heterogeneous Reasoning / Dave Barker-Plummer, John Etchemendy, Michael Murray, Emma Pease and Nik Swoboda -- 3rd International Workshop on Euler Diagrams / Peter Chapman and Luana Micallef -- Technology Enhanced Diagrams Research Workshop / Richard Cox and Jonathan San Diego -- Accessible Graphics: Graphics for Vision Impaired People / Cagatay Goncu and Kim Marriott -- Graduate Student Symposium of Diagrams 2012 / Lisa A. Best -- Automatically Recognizing Intended Messages in Grouped Bar Charts / Richard Burns, Sandra Carberry, Stephanie Elzer and Daniel Chester -- Representing Category and Continuum: Visualizing Thought / Barbara Tversky, James E. Corter, Lixiu Yu, David L. Mason and Jeffrey V. Nickerson -- Elucidating the Mechanism of Spontaneous Diagram Use in Explanations: How Cognitive Processing of Text and Diagrammatic Representations Are Influenced by Individual and Task-Related Factors / Emmanuel Manalo and Yuri Uesaka -- Orthogonal Hyperedge Routing / Michael Wybrow, Kim Marriott and Peter J. Stuckey -- Improved Layout for Data Flow Diagrams with Port Constraints / Lars Kristian Klauske, Christoph Daniel Schulze, Miro Spönemann and Reinhard von Hanxleden -- Aesthetic Layout of Wiring Diagrams / Christian Ernstbrunner and Josef Pichler -- Points, Lines and Arrows in Statistical Graphs / Cengiz Acartürk -- Enriching Indented Pixel Tree Plots with Node-Oriented Quantitative, Categorical, Relational, and Time-Series Data / Michael Burch, Michael Raschke, Miriam Greis and Daniel Weiskopf -- Interpreting Effect Size Estimates through Graphic Analysis of Raw Data Distributions / Michael T. Bradley, Andrew Brand and A. Luke MacNeill -- Psychological Evidence of Mental Segmentation in Table Reading / Takeshi Sugio, Atsushi Shimojima and Yasuhiro Katagiri -- Proof-Theoretical Investigation of Venn Diagrams: A Logic Translation and Free Rides / Ryo Takemura -- Euler Diagram Encodings / Paolo Bottoni, Gennaro Costagliola and Andrew Fish -- Speedith: A Diagrammatic Reasoner for Spider Diagrams / Matej Urbas, Mateja Jamnik, Gem Stapleton and Jean Flower -- Algebra Diagrams: A HANDi Introduction / Peter C.-H. Cheng -- Boolean Differences between Two Hexagonal Extensions of the Logical Square of Oppositions / Hans Smessaert -- An Exploration of Visual Complexity / Helen C. Purchase, Euan Freeman and John Hamer -- Diagram Ecologies -- Diagrams as Science and Game Board / Christoph Lueder -- Dynamic Diagrams: A Composition Alternative / Richard Lowe and Jean-Michel Boucheix -- Diagrammatically-Driven Formal Verification of Web-Services Composition / Petros Papapanagiotou, Jacques Fleuriot and Sean Wilson -- The Diagram of Flow: Its Departure from Software Engineering and Its Return / S.J. Morris and O.C.Z. Gotel -- DDA\Repository: An Associative, Dynamic and Incremental Repository of Design Diagrams / Bharat Dave and Gwyllim Jahn -- Structure, Space and Time: Some Ways That Diagrams Affect Inferences in a Planning Task / David L. Mason, James E. Corter, Barbara Tversky and Jeffrey V. Nickerson -- What Can Concept Diagrams Say? / Gem Stapleton, John Howse, Peter Chapman, Ian Oliver and Aidan Delaney -- CDEG: Computerized Diagrammatic Euclidean Geometry 2.0 / Nathaniel Miller -- Design and Implementation of Multi-camera Systems Distributed over a Spherical Geometry / Hossein Afshari, Kerem Seyid, Alexandre Schmid and Yusuf Leblebici -- Algebraic Aspects of Duality Diagrams / Lorenz Demey -- The Use of Diagrams in Science / An Examination of Trends in Articles Published in Science between 1880 and 2010 / Lillian P. Fanjoy, A. Luke MacNeill and Lisa A. Best -- A User Study on Curved Edges in Graph Visualisation / Kai Xu, Chris Rooney, Peter Passmore and Dong-Han Ham -- Truth Diagrams: An Overview / Peter C.-H. Cheng -- Are Teachers Aware of Students' Lack of Spontaneity in Diagram Use? Suggestions from a Mathematical Model-Based Analysis of Teachers' Predictions / Yuri Uesaka, Emmanuel Manalo and Masanori Nakagawa -- Modelling Delivery Information Flow: A Comparative Analysis of DSMs, DFDs and ICDs / Christopher Durugbo, Ashutosh Tiwari and Jeffrey R. Alcock -- Completeness Proofs for Diagrammatic Logics / Jim Burton, Gem Stapleton and John Howse -- Modelling Information Flow: Improving Diagrammatic Visualisations / Christopher Durugbo -- A Graph Calculus for Proving Intuitionistic Relation Algebraic Equations / Renata de Freitas and Petrucio Viana -- Genetic Algorithm for Line Labeling of Diagrams Having Drawing Cues / Alexandra Bonnici and Kenneth Camilleri -- A Logical Investigation on Global Reading of Diagrams / Ryo Takemura, Atsushi Shimojima and Yasuhiro Katagiri -- Pictures Are Visually Processed; Symbols Are also Recognized / Peter W. Coppin -- How Do Viewers Spontaneously Segment Animated Diagrams of Mechanical and Biological Subject Matter? / Jean-Michel Boucheix and Richard Lowe -- Which Diagrams and When? / Health Workers' Choice and Usage of Different Diagram Types for Service Improvement / Gyuchan Thomas Jun, Cecily Morrison, Christopher O'Loughlin and P. John Clarkson -- Eye Movement Patterns in Solving Scientific Graph Problems / Miao-Hsuan Yen, Chieh-Ning Lee and Yu-Chun Yang -- Formalising Simple Codecharts / Jon Nicholson and Aidan Delaney -- Notes about the London Underground Map as an Iconic Artifact / Breno Bitarello, Pedro Atã and João Queiroz -- The Efficacy of Diagrams in Syllogistic Reasoning: A Case of Linear Diagrams / Yuri Sato and Koji Mineshima.
Record Nr. STANFORD-a9656528
[Diagrams (Conference) (7th : 2012 : Canterbury, England)]  
Materiale a stampa
Lo trovi qui: Stanford University
AI approaches to the complexity of legal systems : models and ethical challenges for legal systems, legal language and legal ontologies, argumentation and software agents : International Workshop AICOL-III, held as Part of the 25th IVR Congress, Frankfurt am Main, Germany, August 15-16, 2011 : revised selected papers / Monica Palmirani [and others] (eds.).
AI approaches to the complexity of legal systems : models and ethical challenges for legal systems, legal language and legal ontologies, argumentation and software agents : International Workshop AICOL-III, held as Part of the 25th IVR Congress, Frankfurt am Main, Germany, August 15-16, 2011 : revised selected papers / Monica Palmirani [and others] (eds.).
Creatore [AICOL (Conference) (3rd : 2011 : Frankfurt am Main, Germany)]
Estensione 1 online resource.
Disciplina 340/.1
Accesso persona Palmirani, Monica
Accesso convegno World Congress on Philosophy of Law and Social Philosophy (25th : 2011 : Frankfurt am Main, Germany)
Soggetto non controllato Computer science
Computer Communication Networks
Data mining
Artificial intelligence
Law.
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 9783642357312
3642357318
9783642357305
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Compliance with Normative Systems / Giovanni Sartor -- Coherence-Based Account of the Doctrine of Consistent Interpretation / Michał Araszkiewicz -- Three Roads to Complexity, AI and the Law of Robots: On Crimes, Contracts, and Torts / Ugo Pagallo -- The Legal Challenges of Networked Robotics: From the Safety Intelligence Perspective / Yueh-Hsuan Weng and Sophie Ting Hong Zhao -- Cloud Computting: New Research Perspectives for Computers and Law / Daniele Bourcier and Primavera De Filippi -- Balancing Rights and Values in the Italian Courts: A Benchmark for a Quantitative Analysis / Tommaso Agnoloni, Maria-Teresa Sagri and Daniela Tiscornia -- Survival of the Fittest: Network Analysis of Dutch Supreme Court Cases / Radboud Winkels and Jelle de Ruyter -- Ontology Framework for Judgment Modelling / Marcello Ceci and Monica Palmirani -- Eunomos, a Legal Document and Knowledge Management System to Build Legal Services / Guido Boella, Llio Humphreys, Marco Martin, Piercarlo Rossi and Leendert van der Torre -- Axioms on a Semantic Model for Legislation for Accessing and Reasoning over Normative Provisions / Enrico Francesconi -- An Open Access Policy for Legal Informatics Dissemination and Sharing / Enrico Francesconi and Ginevra Peruginelli.
Advancing an Open Access Publication Model for Legal Information Institutes / Pompeu Casanovas and Enric Plaza -- Combinations of Normal and Non-normal Modal Logics for Modeling Collective Trust in Normative MAS / Clara Smith, Agustín Ambrossio, Leandro Mendoza and Antonino Rotolo -- Software Agents as Boundary Objects / Migle Laukyte -- Argumentation and Intuitive Decision Making: Criminal Sentencing and Sentence Indication / Andrew Vincent -- Application of Model-Based Diagnosis to Multi-Agent Systems Representing Public Administration / Alexander Boer and Tom van Engers -- Semantic Annotation of Legal Texts through a FrameNet-Based Approach / Marcello Ceci, Leonardo Lesmo, Alessandro Mazzei, Monica Palmirani and Daniele P. Radicioni -- Developing a Frame-Based Lexicon for the Brazilian Legal Language: The Case of the Criminal_Process Frame / Anderson Bertoldi and Rove Luiza de Oliveira Chishman -- Creative Commons and Grand Challenge to Make Legal Language Simple / Matěj Myška, Terezie Smejkalová, Jaromír Šavelka and Martin Škop -- From User Needs to Expert Knowledge: Mapping Laymen Queries with Ontologies in the Domain of Consumer Mediation / Meritxell Fernández-Barrera and Pompeu Casanovas.
Record Nr. STANFORD-a9858031
[AICOL (Conference) (3rd : 2011 : Frankfurt am Main, Germany)]  
Materiale a stampa
Lo trovi qui: Stanford University
Universal access in human-computer interaction [electronic resource] : 7th International Conference, UAHCI 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings / Constantine Stephanidis, Margherita Antona (eds.).
Universal access in human-computer interaction [electronic resource] : 7th International Conference, UAHCI 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings / Constantine Stephanidis, Margherita Antona (eds.).
Creatore [International Conference on Universal Access in Human-Computer Interaction (7th : 2013 : Las Vegas, Nev.)]
Estensione 1 online resource (3 v.)
Accesso persona Stephanidis, Constantine
Antona, Margherita
Accesso convegno International Conference on Human-Computer Interaction (15th : 2013 : Las Vegas, Nev.)
Soggetto non controllato Computer science
Medical records -- Data processing
User Interfaces and Human Computer Interaction
Computers and Society
Health Informatics
Information Systems Applications (incl. Internet)
ISBN 9783642391880 (pt. 1 : electronic bk.)
9783642391910 (pt. 2 : electronic bk.)
9783642391941 (pt. 3 : electronic bk.)
3642391885 (pt. 1 : electronic bk.)
3642391915 (pt. 2 : electronic bk.)
364239194X (pt. 3 : electronic bk.)
9783642391873 (pt. 1)
9783642391903 (pt. 2)
9783642391934 (pt. 3)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Design methods, tools, and interaction techniques for eInclusion -- pt. 2. User and context diversity -- pt. 3. Applications and services for quality of life.
Record Nr. STANFORD-a10215682
[International Conference on Universal Access in Human-Computer Interaction (7th : 2013 : Las Vegas, Nev.)]  
Materiale a stampa
Lo trovi qui: Stanford University
Second generation biometrics : the ethical, legal and social context / Emilio Mordini, Dimitros Tzovaras, editors
Second generation biometrics : the ethical, legal and social context / Emilio Mordini, Dimitros Tzovaras, editors
Estensione 1 online resource (x, 353 pages) : illustrations.
Disciplina 006.4
Accesso persona Mordini, E. (Emilio)
Tzovaras, Dimitrios
Soggetto non controllato Philosophy (General)
Ethics
Technology -- Philosophy
Computer science
Computers -- Law and legislation
Computers and Society
Philosophy of Technology
Legal Aspects of Computing
ISBN 9789400738928
9400738927
9400738919
9789400738911
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. SECTION ONE: "Foundations and Issues" -- Epistemological Foundation of Biometrics / Giampaolo Ghilardi and Flavio Keller -- Biometric Recognition: An Overview / Anil K. Jain and Ajay Kumar -- Biometrics, Privacy and Agency / Annemarie Sprokkereef and Paul de Hert -- Introduction / Emilio Mordini, Dimitrios Tzovaras and Holly Ashton -- Part 2. SECTION TWO: "Emerging Biometrics and Technology Trends" -- Gait and Anthropometric Profile Biometrics: A Step Forward / Dimosthenis Ioannidis, Dimitrios Tzovaras, Gabriele Dalle Mura, Marcello Ferro and Gaetano Valenza, et al. -- Activity and Event Related Biometrics / Anastasios Drosou and Dimitrios Tzovaras -- Electrophysiological Biometrics: Opportunities and Risks / Alejandro Riera, Stephen Dunne, Iván Cester and Giulio Ruffini -- Intelligent Biometrics / Farzin Deravi -- Part 3. Identity, Intentions and Emotions -- Behavioural Biometrics and Human Identity / Ben A.M. Schouten, Albert Ali Salah and Rob van Kranenburg -- Behavioural Biometrics: Emerging Trends and Ethical Risks / Günter Schumacher -- Facial Recognition, Facial Expression and Intention Detection / Massimo Tistarelli, Susan E. Barrett and Alice J. O'Toole -- The Transparent Body: Medical Information, Physical Privacy and Respect for Body Integrity / Emilio Mordini and Holly Ashton -- Part 4. New Biometrics in Context -- Security in the Danger Zone: Normative Issues of Next Generation Biometrics / Irma van der Ploeg -- The Dark Side of the Moon: Accountability, Ethics and New Biometrics / Juliet Lodge -- Conclusions / Emilio Mordini.
Record Nr. STANFORD-a9616816
Materiale a stampa
Lo trovi qui: Stanford University