Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Human Computer Interaction Research in Web Design and Evaluation
Human Computer Interaction Research in Web Design and Evaluation
Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense....
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Designing Software-Intensive Systems: Methods and Principles (Premier Reference Source)
Designing Software-Intensive Systems: Methods and Principles (Premier Reference Source)
Design for software-intensive systems requires adequate methodology and tool support in order for researchers and practitioners to make use of and develop very large and complex systems. Software engineering environments help reduce the design costs of very large and intricate software systems while improving the quality of the software produced....
Philosophical Frameworks for Understanding Information Systems
Philosophical Frameworks for Understanding Information Systems
Information systems have five main areas of research and practice in which humans relate to information and communications technology. Typically isolated from one another, these areas are: the nature of computers and information, the creation of information technologies, the development of artifacts for human use, the usage of information systems,...
Security and Software for Cybercafes (Premier Reference Source)
Security and Software for Cybercafes (Premier Reference Source)
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,...
Enhancing E-Learning with Media-Rich Content and Interactions
Enhancing E-Learning with Media-Rich Content and Interactions
Online learning is transcending from the text-rich educational experience of the past to a video- and audio-rich learning transformation. The greater levels of media-rich content and media-rich interaction that are currently prevalent in online leisure experiences will help to increase e-learning s future efficiency and effectiveness....
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches....
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies...
Encyclopedia of Information Communication Technology
Encyclopedia of Information Communication Technology
The Encyclopedia of Information Communication Technology (ICT) is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies.

A reference point for studies...

Managing IT/Community Partnerships in the 21st Century
Managing IT/Community Partnerships in the 21st Century
Universities are increasingly being asked to play a greater role in their communities. With the growth of the technology industry and the increasing importance of the Internet in education and everyday life, academic IT departments are beginning to form partnerships with both non-profit and for-profit organizations in the local community....
Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications
Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications
Todays work is characterized by a high degree of innovation and thus demands a thorough overview of relevant knowledge in the world and in organizations. Semantic Work Environments support the work of the user by collecting knowledge about needs and providing processed and improved knowledge to be integrated into work.

Emerging...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy