top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Persuasive technology [electronic resource] : 8th International Conference, PERSUASIVE 2013, Sydney, NSW, Australia, April 3-5, 2013. Proceedings / Shlomo Berkovsky, Jill Freyne (eds.).
Persuasive technology [electronic resource] : 8th International Conference, PERSUASIVE 2013, Sydney, NSW, Australia, April 3-5, 2013. Proceedings / Shlomo Berkovsky, Jill Freyne (eds.).
Creatore [International Conference on Persuasive Technology for Human Well-Being (8th : 2013 : Sydney, N.S.W.)]
Estensione 1 online resource.
Disciplina 153.8/520285
Accesso persona Berkovsky, Shlomo
Freyne, Jill
Genere/Forma Electronic books
Soggetto non controllato Computer science
Medical records -- Data processing
Multimedia systems
Health Informatics
User Interfaces and Human Computer Interaction
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 9783642371578 (electronic bk.)
3642371574 (electronic bk.)
9783642371561
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Persuasive Technology or Explorative Technology? / Anind Dey -- How Can Persuasive Technology Help People Choose for Themselves? / Anthony Jameson -- Software Architecture Design for Health BCSS: Case Onnikka / Tuomas Alahäivälä, Harri Oinas-Kukkonen, Terhi Jokelainen -- Viewing and Controlling Personal Sensor Data: What Do Users Want? / Debjanee Barua, Judy Kay, Cécile Paris -- Colours That Move You: Persuasive Ambient Activity Displays / Patrick Burns, Christopher Lueg, Shlomo Berkovsky -- Personalized Persuasive Technology - Development and Validation of Scales for Measuring Persuadability / Marc Busch, Johann Schrammel, Manfred Tscheligi -- The Scrabble of Language towards Persuasion: Changing Behaviors in Journalism / Cate Dowd -- A Customisable Dashboard Display for Environmental Performance Visualisations / Daniel Filonik ... [et al.] -- An Activist Lens for Sustainability: From Changing Individuals to Changing the Environment / Eva Ganglbauer, Wolfgang Reitberger, Geraldine Fitzpatrick --
Improving the Design of Online Applications for Social Benefit through a Behaviour Change Model / Kathryn Gough, Jillian Hamilton -- Curbing Resource Consumption Using Team-Based Feedback / Souleiman Hasan ... [et al.] -- Three Approaches to Ethical Considerations in the Design of Behavior Change Support Systems / Pasi Karppinen, Harri Oinas-Kukkonen -- Using Log-Data as a Starting Point to Make eHealth More Persuasive / Saskia M. Kelders, Julia E. W. C. (Lisette) van Gemert-Pijnen -- Where to Place My Ambient Persuasive Display? Insights from a Six-Month Study / Patricia M. Kluckner, Astrid Weiss, Manfred Tscheligi -- Lingering Serious Experience as Trigger to Raise Awareness, Encourage Reflection and Change Behavior / Tim Marsh, Brigid Costello -- Personalizing Triggers for Charity Actions / Judith Masthoff, Sitwat Langrial, Kees van Deemter --
Examining the Efficacy of a Persuasive Technology Package in Reducing Texting and Driving Behavior / Brenda Miranda ... [et al.] -- Enhanced Reach: Assisting Social Interaction Based on Geometric Relationships / Asaki Miura, Dushyantha Jayatilake, Kenji Suzuki -- Identifying Persuasive Qualities of Decentralized Peer-to-Peer Online Social Networks in Public Health / Sahiti Myneni ... [et al.] -- Modeling Gender Differences in Healthy Eating Determinants for Persuasive Intervention Design / Rita O. Orji, Julita Vassileva, Regan L. Mandryk -- Social Stairs: Taking the Piano Staircase towards Long-Term Behavioral Change / Michel Peeters, Carl Megens, Elise van den Hoven, Caroline Hummels -- Invisible Work: An Ambient System for Awareness and Reflection of Household Tasks / Wolfgang Reitberger, Martin Kastenmiller, Geraldine Fitzpatrick -- I Didn't Know That Virtual Agent Was Angry at Me: Investigating Effects of Gaze Direction on Emotion Recognition and Evaluation / Peter A. M. Ruijten, Cees J. H. Midden, Jaap Ham --
Three Themes for Designing Games That Aim to Promote a Positive Body Perception in Hospitalized Children / Ruth Sancho Huerga, Jennifer Lade, Florian 'Floyd' Mueller -- Persuading Consumers to Reduce Their Consumption of Electricity in the Home / Alan F. Smeaton, Aiden R. Doherty -- Spotz: A Location-Based Approach to Self-awareness / Misha Sra, Chris Schmandt -- Bro-cam: Improving Game Experience with Empathic Feedback Using Posture Tracking / Chiew Seng Sean Tan, Johannes Schöning, Jan Schneider Barnes -- Trusting Digital Chameleons: The Effect of Mimicry by a Virtual Social Agent on User Trust / Frank M. F. Verberne ... [et al.] -- Toward the Design of a Dashboard to Promote Environmentally Sustainable Behavior among Office Workers / Ray Yun ... [et al.] -- Sustainability in the Workplace: Nine Intervention Techniques for Behavior Change / Ray Yun ... [et al.]
Record Nr. UPENN-9960105363503681
[International Conference on Persuasive Technology for Human Well-Being (8th : 2013 : Sydney, N.S.W.)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Collaboration and technology [electronic resource] : 18th International Conference, CRIWG 2012 Raesfeld, Germany, September 16-19, 2012 Proceedings / edited by Valeria Herskovic...[et al.].
Collaboration and technology [electronic resource] : 18th International Conference, CRIWG 2012 Raesfeld, Germany, September 16-19, 2012 Proceedings / edited by Valeria Herskovic...[et al.].
Creatore [Conference on Collaboration Technology (18th : 2012 : Raesfeld, Germany)]
Estensione 1 online resource.
Disciplina 005.3/76
Accesso persona Herskovic, Valeria
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data mining
Information storage and retrieval systems
Information Systems Applications (incl. Internet)
Computers and Education
User Interfaces and Human Computer Interaction
Computers and Society
ISBN 9783642332845 (electronic bk.)
3642332846 (electronic bk.)
9783642332838
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Origin of Design. The Initial Low Gravitational Entropy of the Universe as the Origin of Design in Nature / Charles H. Lineweaver and Chas A. Egan -- On the Biological Origin of Design in Nature / Attila Grandpierre -- Creativity in Nature / Steve McGrew -- Part 2. Philosophical aspects of design. Plato's Pythagorean Cosmos: Order and Chaos in the Intelligence of Natural Design / Mark Faller -- War or Peace? Huxley and Kropotkin's Battle Over the Design of Virtue / Oren Harman -- Free Will in God's Dice Game / Malcolm E. Schrader -- Does Biology Need a New Theory of Explanation? A Biological Perspective on Kant's Critique of Teleological Judgment / Chris Chetland -- Pragmatism, Inquiry, and Design: A Dynamic Approach / Tibor Solymosi -- The Design of Morality / John R. Shook -- Part 3. Theological aspects of design. The Best Mislaid Plans: A Religious Approach to the Question of the Planning of Reality / Yisrael Rozenson -- Judaism and Evolution in Four Dimensions: Biological, Spiritual, Cultural, and Intellectual / Shlomo E. Glicksberg -- Random Natural Laws Versus Direct Trends: A Cabbalistic Interpretation Based on the Teachings of Rabbi Kook / Dov Berger -- The Identity of Designer and Design / Klaus Konrad Klostermaier -- In the Beginning There Was Lightning: Fulguro-Genesis and Eduard Loewenthal's Religion of Religions / Elisabeth Rees-Dessauer -- Structure and Creativeness: A Reinterpretation of the Neo-Confucian Binary Category Li and Qi / Jana S. Rošker -- Evolution: The Biblical Account of Life's Development / Gerald L. Schroeder.
Part 4. Darwinism as the backbone of the life sciences. Design and Disorder: Gould, Adaptationism and Evolutionary Psychiatry / Pieter R. Adriaens -- Architecture and Design Among Plants and Animals: Convergent and Divergent Developmental Mechanisms / Cory D. Bishop, Moira E. Galway and David J. Garbary -- The Lingual Taste Papillae: A Delicate and Complicated Nature's Design for Taste Modalities Perception / Natan Gadoth and Eliyahu Mass -- Divine Genesis, Evolution, and Astrobiology / Joseph Seckbach -- Consistent Patterns of Statistical Distributions in Natural Ecological Communities: Lake Phytoplankton / Yury Kamenir -- Coupling of Growth, Differentiation and Morphogenesis: An Integrated Approach to Design in Embryogenesis / Vincent Fleury and Richard Gordon -- Interior Cell Design: VICKZ Proteins Mediate RNA Localization and Cell Function / Joel K. Yisraeli -- Organic Codes and the Origin of Language / Marcello Barbieri -- Mechano-Sensing in Embryonic Biochemical and Morphologic Design: Evolutionary Perspectives on Emergence of Primary Organisms / Emmanuel Farge -- Part 5. Critical discussion of design in what lies beyond Darwinism. A Response to Darwin's Dilemma: A-PR Cycles and the Origin of Design in Nature / Zann Gill -- The Synthetic Approach in Biology:Epistemic Notes for Synthetic Biology / Pier Luigi Luisi -- Necessity and Freedom in Designs of Nature / Josef Svoboda -- Not All Designs Are Created Equal / Tom Barbalet -- Design of Living Systems in the Information Age: Brain, Creativity, and the Environment / Michael D. Miran, Esta Miran and Nicole Chen -- Technological Design of Natural Exemplars / Massimo Negrotti -- Trouble for Natural Design / Arthur Ward -- Imagining a Theory of Everything for Adaptive Systems / Stephen P. Cook.
Part 6. Design in the physical sciences. Hidden Order and the Origin of Complex Structures / Subhash Kak -- What the Fine-Tuning Argument Shows (and Doesn't Show) / Michael Dickson -- The Continuous Increase in the Complexity of the Designed Structures of the Universe Is Described as Movement Against Maximum Entropy / Arie S. Issar -- Law, Order, and Probability / Moshe Pollak -- Design and Self-Organization / Andrew M. Winters -- Development of Organisms as Self-Organization of Mechanically Stressed Macroscopic Designs / Lev V. Beloussov -- Playing God: The Historical Motivations of Artificial Life / Stephen Grand -- Part 7. Design in the social sciences. The Socially Constructed Natural Origins of Self-Organization / Diane M. Rodgers -- Complex Epidemics, Simplistic Tools: The Failure of AIDS Policy in Africa / Eileen Stillwaggon -- Part 8. Summary and Conclusions / Summary and Conclusion of Origin(s) of Design in Nature: A Fresh, Interdisciplinary Look at How Design Emerges in Complex Systems, Especially Life / Liz Stillwaggon Swan.
Record Nr. UPENN-9960098803503681
[Conference on Collaboration Technology (18th : 2012 : Raesfeld, Germany)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Principles of security and trust [electronic resource] : first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings / Pierpaolo Degano, Joshua D. Guttman (eds.).
Principles of security and trust [electronic resource] : first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings / Pierpaolo Degano, Joshua D. Guttman (eds.).
Creatore [POST 2012 (2012 : Tallinn, Estonia)]
Estensione 1 online resource (xiv, 429 p.)
Disciplina 005.8
Accesso persona Degano, Pierpaolo, 1950-
Guttman, Joshua D.
Accesso convegno ETAPS (Conference) (2012 : Tallinn, Estonia)
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 9783642286414 (electronic bk.)
3642286410 (electronic bk.)
3642286402
9783642286407
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Differential Privacy and the Power of (Formalizing) Negative Thinking (Extended Abstract) / Cynthia Dwork -- Security Protocol Verification: Symbolic and Computational Models / Bruno Blanchet -- Analysing Routing Protocols: Four Nodes Topologies Are Sufficient / Véronique Cortier, Jan Degrieck and Stéphanie Delaune -- Parametric Verification of Address Space Separation / Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune and Amit Vasudevan -- Verification of Security Protocols with Lists: From Length One to Unbounded Length / Miriam Paiola and Bruno Blanchet -- Privacy Supporting Cloud Computing: ConfiChair, a Case Study / Myrto Arapinis, Sergiu Bursuc and Mark Ryan -- A Formal Analysis of the Norwegian E-voting Protocol / Véronique Cortier and Cyrille Wiedling -- Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication / David Basin, Cas Cremers and Simon Meier -- Security Proof with Dishonest Keys / Hubert Comon-Lundh, Véronique Cortier and Guillaume Scerri -- Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity / Myrto Arapinis, Sergiu Bursuc and Mark D. Ryan -- Towards Unconditional Soundness: Computationally Complete Symbolic Attacker / Gergei Bana and Hubert Comon-Lundh -- Verified Indifferentiable Hashing into Elliptic Curves / Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Federico Olmedo and Santiago Zanella Béguelin -- Provable De-anonymization of Large Datasets with Sparse Dimensions / Anupam Datta, Divya Sharma and Arunesh Sinha -- Revisiting Botnet Models and Their Implications for Takedown Strategies / Ting-Fang Yen and Michael K. Reiter -- A Game-Theoretic Analysis of Cooperation in Anonymity Networks / Mu Yang, Vladimiro Sassone and Sardaouna Hamadou -- Deciding Selective Declassification of Petri Nets / Eike Best and Philippe Darondeau -- Enforceable Security Policies Revisited / David Basin, Vincent Jugé, Felix Klaedtke and Eugen Zălinescu -- Towards Incrementalization of Holistic Hyperproperties / Dimiter Milushev and Dave Clarke -- Type-Based Analysis of PKCS#11 Key Management / Matteo Centenaro, Riccardo Focardi and Flaminia L. Luccio -- A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow / Torben Amtoft, Josiah Dodds, Zhi Zhang, Andrew Appel and Lennart Beringer, et al. -- PTaCL: A Language for Attribute-Based Access Control in Open Systems / Jason Crampton and Charles Morisset -- A Core Calculus for Provenance / Umut A. Acar, Amal Ahmed, James Cheney and Roly Perera.
Record Nr. UPENN-9960093293503681
[POST 2012 (2012 : Tallinn, Estonia)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Constructive side-channel analysis and secure design [electronic resource] : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised selected papers / Emmanuel Prouff (ed.).
Constructive side-channel analysis and secure design [electronic resource] : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised selected papers / Emmanuel Prouff (ed.).
Creatore [COSADE (Workshop) (4th : 2013 : Paris, France)]
Estensione 1 online resource.
Disciplina 005.8/2
Accesso persona Prouff, Emmanuel
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Systems and Data Security
Computers and Society
ISBN 9783642400261 (electronic bk.)
3642400264 (electronic bk.)
9783642400254
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UPENN-9960108963503681
[COSADE (Workshop) (4th : 2013 : Paris, France)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Information and communication technology [electronic resource] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / Khabib Mustofa...[et al.] (eds.).
Information and communication technology [electronic resource] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings / Khabib Mustofa...[et al.] (eds.).
Creatore [ICT-EurAsia 2013 (2013 : Yogyakarta, Indonesia)]
Estensione 1 online resource.
Disciplina 004.6
Accesso persona Mustofa, Khabib
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information storage and retrieval systems
Computers and Society
Systems and Data Security
Information Systems Applications (incl. Internet)
ISBN 9783642368189 (electronic bk.)
3642368182 (electronic bk.)
3642368174 (print)
9783642368172 (print)
9783642368172
Classificazione 54.81
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information and Communication Technology- Eurasia Conference (ICT-EurAsia). E-Society. Translating the Idea of the eGovernment One-Stop-Shop in Indonesia / Fathul Wahid -- A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network / Thi Ai Thao Nguyen, Tran Khanh Dang -- Early-Detection System for Cross-Language (Translated) Plagiarism / Khabib Mustofa, Yosua Albert Sir -- TransWiki: Supporting Translation Teaching / Robert P. Biuk-Aghai, Hari Venkatesan -- Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework / Rajesri Govindaraju, Aulia F. Hadining, Dissa R. Chandra -- Software Engineering. Software Development Methods in the Internet of Things / Selo Sulistyo -- SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications / Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki -- OSMF: A Framework for OSS Process Measurement / Wikan Danar Sunindyo, Fajar Juang Ekaputra -- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs / Susmit Bagchi -- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning / Suprapto, Retantyo Wardoyo --
Security and Privacy. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries / Chan Nam Ngo, Tran Khanh Dang -- Semantic-Aware Obfuscation for Location Privacy at Database Level / Thu Thi Bao Le, Tran Khanh Dang -- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch / Tran Tri Dang, Quynh Chi Truong, Tran Khanh Dang -- CAPTCHA Suitable for Smartphones / Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura -- Code Based KPD Scheme with Full Connectivity: Deterministic Merging / Pinaki Sarkar, Aritra Dhar -- Cloud and Internet Computing. Indonesian Digital Natives / Neila Ramdhani, Wisnu Wiradhany -- End-to-End Delay Performance for VoIP on LTE System in Access Network / Ng Liang Shen, Noraniah Abdul Aziz, Tutut Herawan -- Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required? / Faisal Syafar, Jing Gao --
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud / Nguyen Quang-Hung ... [et al.] -- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution / Nungki Selviandro, Zainal Arifin Hasibuan -- Knowledge Management. Information Systems Strategic Planning for a Naval Hospital / Hery Harjono Muljo, Bens Pardamean -- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique / Wayan Suparta, Kemal Maulana Alhasa -- A Data-Driven Approach toward Building Dynamic Ontology / Dhomas Hatta Fudholi ... [et al.] -- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Muhammad Asfand-e-yar, A Min Tjoa -- Asian Conference on Availability, Reliability and Security (AsiaARES). Dependable Systems and Applications. Secure and Verifiable Outsourcing of Sequence Comparisons / Yansheng Feng ... [et al.] -- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter / Dongjin Choi, Ilsun You, Pankoo Kim --
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) / Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki -- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation / Huabiao Lu ... [et al.] -- On Identifying Proper Security Mechanisms / Jakub Breier, Ladislav Hudec -- A Recovery Approach for SQLite History Recorders from YAFFS2 / Beibei Wu ... [et al.] -- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors / Yuchao She, Hui Li, Hui Zhu -- SA4WSs: A Security Architecture for Web Services / Lingxia Liu ... [et al.] -- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation / Shuhui Hou ... [et al.] -- A Test Case Generation Technique for VMM Fuzzing / Xiaoxia Sun ... [et al.] -- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet / Thach V. Bui ... [et al.] -- A Proposal on Security Case Based on Common Criteria / Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka --
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors / Wentao Jia, Rui Li, Chunyan Zhang -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks / Jostein Jensen -- Cryptography. Anonymous Lattice-Based Broadcast Encryption / Adela Georgescu -- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance / Amril Syalim, Takashi Nishide, Kouichi Sakurai -- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation / Xingxing Xie ... [et al.] -- Provably Secure and Subliminal-Free Variant of Schnorr Signature / Yinghui Zhang ... [et al.] -- A Block Cipher Mode of Operation with Two Keys / Yi-Li Huang ... [et al.] -- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing / Ruxandra F. Olimid -- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme / Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong -- Privacy and Trust Management. A Simplified Privacy Preserving Message Delivery Protocol in VDTNs / Youngho Park, Chul Sur, Kyung-Hyune Rhee --
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data / Anis Bkakria ... [et al.] -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control / Nisreen Alam Aldeen, Gerald Quirchmayr -- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol / Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani -- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution / Bo Liu ... [et al.] -- Network Analysis and Security. CSP-Based General Detection Model of Network Covert Storage Channels / Hui Zhu ... [et al.] -- Trustworthy Opportunistic Access to the Internet of Services / Alessandro Armando ... [et al.] -- Architecture of Network Environment for High-Risk Security Experimentation / Xiaohui Kuang, Xiang Li, Jinjing Zhao -- Emulation on the Internet Prefix Hijacking Attack Impaction / Jinjing Zhao, Yan Wen --
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction / Lu Zhao, Ho-Seok Kang, Sung-Ryul Kim -- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge / Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs / Huaqing Wen, Kyung-Hyune Rhee -- A Review of Security Attacks on the GSM Standard / Giuseppe Cattaneo ... [et al.] -- Multimedia Security. An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation / Huan Wang, Mingxing He, Xiao Li -- Image Watermarking Using Psychovisual Threshold over the Edge / Nur Azman Abu ... [et al.] -- A Data Structure for Efficient Biometric Identification / Kensuke Baba, Serina Egawa -- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System / Hae-Min Moon, Sung Bum Pan -- Shifting Primes on OpenRISC Processors with Hardware Multiplier / Leandro Marin, Antonio J. Jara, Antonio Skarmeta.
Record Nr. UPENN-9960105043503681
[ICT-EurAsia 2013 (2013 : Yogyakarta, Indonesia)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Product-focused software process improvement [electronic resource] : 14th International Conference, PROFES 2013, Paphos, Cyprus, June 12-14, 2013. Proceedings / Jens Heidrich...[et al.] (eds.).
Product-focused software process improvement [electronic resource] : 14th International Conference, PROFES 2013, Paphos, Cyprus, June 12-14, 2013. Proceedings / Jens Heidrich...[et al.] (eds.).
Creatore [PROFES 2013 (2013 : Paphos, Cyprus)]
Estensione 1 online resource.
Disciplina 005.1
Accesso persona Heidrich, Jens
Genere/Forma Electronic books
Soggetto non controllato Computer science
Software engineering
Computer simulation
Information systems
Management information systems
Management of Computing and Information Systems
Computers and Society
Computer Appl. in Administrative Data Processing
Simulation and Modeling
Business Information Systems
ISBN 9783642392597 (electronic bk.)
3642392598 (electronic bk.)
9783642392580
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UPENN-9960107523503681
[PROFES 2013 (2013 : Paphos, Cyprus)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Computational social networks [electronic resource] : tools, perspectives and applications / Ajith Abraham, Aboul-Ella Hassanien, editors
Computational social networks [electronic resource] : tools, perspectives and applications / Ajith Abraham, Aboul-Ella Hassanien, editors
Estensione 1 online resource.
Disciplina 302.30285
Accesso persona Abraham, Ajith, 1968-
Hassanien, Aboul Ella
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Database management
User Interfaces and Human Computer Interaction
Computers and Society
ISBN 9781447140481 (electronic bk.)
1447140486 (electronic bk.)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Modeling and Tools -- Computational Social Networks: Tools, Perspectives, and Challenges / Mrutyunjaya Panda, Nashwa El-Bendary, Mostafa A. Salama, Aboul Ella Hassanien and Ajith Abraham -- Hierarchical Graphical Models for Social and Behavioral Analysis and Forecasting / Jian-Wu Xu -- Social Network Analysis Techniques for Social-Oriented Mobile Communication Networks / Guillaume-Jean Herbiet and Pascal Bouvry -- Detection and Interpretation of Communities in Complex Networks: Practical Methods and Application / Vincent Labatut and Jean-Michel Balasque -- Metrics and Models for Social Networks / Nicolás Ignacio Bersano-Méndez, Satu Elisa Schaeffer and Javier Bustos-Jiménez -- Structural Decompositions of Complex Networks / Rong Yang, Leyla Zhuhadar and Olfa Nasraoui -- Enhancing Online Communities with Cycle-Sharing for Social Networks / Nuno Apolónia, Paulo Ferreira and Luís Veiga -- Centrality Robustness and Link Prediction in Complex Social Networks / Søren Atmakuri Davidsen and Daniel Ortiz-Arroyo -- Part 2. Applications -- Social Networking Tools for Knowledge-Based Action Groups / William P. Hall, Susu Nousala, Russell Best and Siddharth Nair -- Dynamic Web Prediction Using Asynchronous Mouse Activity / Anirban Kundu -- PPMN: A City Wide Reliable Public Wireless Mesh Network / Ali Asghar Khodaparast and Azade Kavianfar -- Applications of Social Networks in Peer-to-Peer Networks / Jiaqing Huang, Qingyuan Liu, Zhibin Lei and Dah Ming Chiu -- Intelligent Social Network of Devices / Arpan Pal, Chirabrata Bhaumik, Priyanka Sinha and Avik Ghose -- Social Network-Based Media Sharing in the Ubiquitous Environment: Technologies and Applications / Xun Luo -- Customer Interaction Management Goes Social: Getting Business Processes Plugged in Social Networks / Michaela Geierhos and Mohamed Ebrahim -- Real Emotions for Simulated Social Networks / Pietro Cipresso, Luigi Sellitti, Nadia El Assawy, Federica Galli and Anna Balgera, et al. -- Social Networks for Learning: Breaking Through the Walled Garden of the VLE / Karen Jones, Rhian Pole, Stephen Hole and James Williams -- Social Networks and Recommender Systems: A World of Current and Future Synergies / Kanna Al Falahi, Nikolaos Mavridis and Yacine Atif.
Record Nr. DUKE-005664288
Materiale a stampa
Lo trovi qui: Duke University
Algorithmic game theory : 4th international symposium, SAGT 2011, Amalfi, Italy, October 17-19, 2011 : proceedings / Giuseppe Persiano (ed.).
Algorithmic game theory : 4th international symposium, SAGT 2011, Amalfi, Italy, October 17-19, 2011 : proceedings / Giuseppe Persiano (ed.).
Creatore [SAGT (Symposium) (4th : 2011 : Amalfi, Italy)]
Estensione 1 online resource (xi, 325 pages) : illustrations (some color).
Disciplina 519.3
Accesso persona Persiano, Giuseppe
Soggetto non controllato Computer science
Electronic data processing
Computer simulation
Simulation and Modeling
e-Commerce/e-business
Models and Principles
Computers and Society
Numeric Computing
Probability and Statistics in Computer Science
ISBN 9783642248290
3642248292
3642248284
9783642248283
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9386677
[SAGT (Symposium) (4th : 2011 : Amalfi, Italy)]  
Materiale a stampa
Lo trovi qui: Stanford University
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.).
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.).
Creatore [International Workshop on Security Protocols (19th : 2011 : Cambridge, England)]
Estensione 1 online resource (ix, 380 pages).
Disciplina 005.8
Accesso persona Christianson, Bruce
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 9783642258671
3642258670
9783642258664
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Alice Doesn't Live Here Anymore (Transcript) / Bruce Christianson -- His Late Master's Voice: Barking for Location Privacy / Mike Burmester -- His Late Master's Voice (Transcript of Discussion) / Mike Burmester -- Can We Fix the Security Economics of Federated Authentication? / Ross Anderson -- Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion) / Ross Anderson -- Pico: No More Passwords! / -- Pico: No More Passwords! (Transcript of Discussion) / Frank Stajano -- Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords / Joseph Bonneau -- Getting Web Authentication Right (Transcript of Discussion) / Joseph Bonneau -- When Context Is Better Than Identity: Authentication / Context Using Empirical Channels / Bangdao Chen, Long Hoang Nguyen and Andrew William Roscoe -- When Context Is Better Than Identity (Transcript of Discussion) / Bangdao Chen -- Selective Location Blinding Using Hash Chains / Gabriele Lenzini, Sjouke Mauw and Jun Pang -- Selective Location Blinding Using Hash Chains (Transcript of Discussion) / Sjouke Mauw -- Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces / Alf Zugenmaier -- Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion) / Alf Zugenmaier -- How to Sync with Alice / Feng Hao and Peter Y.A. Ryan -- How to Sync with Alice (Transcript of Discussion) / Feng Hao -- Attack Detection vs. Privacy -- How to Find the Link or How to Hide It? / Jiérí Kůr, Vashek Matyáš, Andriy Stetsko and Petr Švenda -- Attack Detection vs Privacy -- How to Find the Link or How to Hide It (Transcript of Discussion) / Jiérí Kůr and Andriy Stetsko -- The Sense of Security and a Countermeasure for the False Sense / Yuko Murayama, Yasuhiro Fujihara and Dai Nishioka -- The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion) / James Malcolm -- Towards a Theory of Trust in Networks of Humans and Computers / Virgil Gligor and Jeannette M. Wing -- Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion) / Virgil Gligor -- Gearing Up: How to Eat Your Cryptocake and Still Have It / Alex Shafarenko and Bruce Christianson -- Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion) / Alex Shafarenko -- Make Noise and Whisper: A Solution to Relay Attacks / Omar Choudary and Frank Stajano -- Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion) / Omar Choudary -- Scrambling for Lightweight Censorship Resistance / Joseph Bonneau and Rubin Xu -- Scrambling for Lightweight Censorship Resistance (Transcript of Discussion) / Rubin Xu -- The Metaplace Security Model / Michael Roe -- The Metaplace Security Model (Transcript of Discussion) / Michael Roe -- One-Way Cryptography / Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu, et al. -- One-Way Cryptography (Transcript of Discussion) / Matt Blaze -- How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort) / Jonathan Anderson, Frank Stajano and Robert N.M. Watson -- How to Keep Bad Papers Out of Conferences (Transcript of Discussion) / Jonathan Anderson.
Record Nr. STANFORD-a9504079
[International Workshop on Security Protocols (19th : 2011 : Cambridge, England)]  
Materiale a stampa
Lo trovi qui: Stanford University
Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Creatore [Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (2011 : Saarbrücken, Germany)]
Estensione 1 online resource (vi, 224 pages) : illustrations.
Disciplina 005.8
Accesso persona Mödersheim, Sebastian
Palamidessi, Catuscia
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data encryption (Computer science)
Computer software
Computers and Society
Algorithm Analysis and Problem Complexity
Programming Languages, Compilers, Interpreters
ISBN 9783642273759
3642273750
9783642273742
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9518531
[Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (2011 : Saarbrücken, Germany)]  
Materiale a stampa
Lo trovi qui: Stanford University