Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Autonomous Robots and Agents (Studies in Computational Intelligence)
Autonomous Robots and Agents (Studies in Computational Intelligence)
Robots and autonomous agents have permeated every aspect of human life. They are not only omnipresent on the shop floors; they have pervaded our homes and are around us everywhere. Design methodologies and implementation techniques of intelligent machines are making progress in leaps and bounds. Smart interaction, cooperation, and pro-activeness...
How We Cooperate: A Theory of Kantian Optimization
How We Cooperate: A Theory of Kantian Optimization
A new theory of how and why we cooperate, drawing from economics, political theory, and philosophy to challenge the conventional wisdom of game theory

Game theory explains competitive behavior by working from the premise that people are self-interested. People don’t just compete, however; they also
...
Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

Enterprise 2.0
Enterprise 2.0

The notion that the corporation is changing fundamentally has been around for decades – dating back to Peter Drucker’s seminal work in the 1980s on ‘The New Organization’. In 1992, I discussed what I called ‘The New Enterprise’ in my book Paradigm Shift, saying ‘the corporation of old simply...

Language and Automata Theory and Applications: 5th International Conference
Language and Automata Theory and Applications: 5th International Conference
These proceedings contain the papers that were presented at the 5th International Conference on Language and Automata Theory and Applications (LATA 2011), held in Tarragona, Spain, during May 26–31, 2011.

The scope of LATA is rather broad, including: algebraic language theory; algorithms for semi-structured
...
Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government
Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government
Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government deals with the accelerating evolution in the computerization of society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented by the novelties introduced, year by year, by Information and Communication Technologies....
Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

Designing Interactive Systems: A Comprehensive Guide to HCI and Interaction Design (2nd Edition)
Designing Interactive Systems: A Comprehensive Guide to HCI and Interaction Design (2nd Edition)
Designing Interactive Systems is aimed squarely at the next generation of interactive system designers. This book presents a coherent introduction to the practical issues of creating interactive systems and products from a human-centred perspective. It develops the principles and methods of human–computer interaction (HCI)...
Public Key Cryptography  PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
Public Key Cryptography PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008.

It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the
...
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data,...
Production Planning in Production Networks: Models for Medium and Short-term Planning
Production Planning in Production Networks: Models for Medium and Short-term Planning
Distributed production networks are structures which are considered able to provide the organisational agility and efficiency necessary to compete in the global market. The performance of such organisations heavily depends on the ability of those involved in the network to coordinate their activities. Two approaches are available for managing...
Erikson on Development in Adulthood: New Insights from the Unpublished Papers
Erikson on Development in Adulthood: New Insights from the Unpublished Papers

Erik Erikson (1902-1994) was one of the most eminent and prolific psychologists of the 20th century. Over his long career he published a dozen books, including classics such as Childhood and Society; Identity, Youth, and Crisis; and Young Man Luther . He was awarded the Pulitzer Prize and the National Book Award in 1970 for...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy