Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Contextual Processing: Theory and Applications
Introduction to Contextual Processing: Theory and Applications

Contextual computing has been around for several years with a variety of names such as pervasive computation and omnipresent computing. Recently there has been a drive toward making personal digital assistants (PDAs) more aware of their environment. For example, a cell phone may sense that it is in a conference room and reason that it should...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

A PhD Is Not Enough!: A Guide to Survival in Science
A PhD Is Not Enough!: A Guide to Survival in Science

Despite your graduate education, brainpower, and technical prowess, your career in scientific research is far from assured. Permanent positions are scarce, science survival is rarely part of formal graduate training, and a good mentor is hard to find.

In A Ph.D. Is Not Enough!, physicist Peter J. Feibelman lays...

Map Scripting 101: An Example-Driven Guide to Building Interactive Maps with Bing, Yahoo!, and Google Maps
Map Scripting 101: An Example-Driven Guide to Building Interactive Maps with Bing, Yahoo!, and Google Maps

The Web has changed our lives in many ways. The first online, on-demand driving directions from MapQuest very nearly rendered traditional road atlases obsolete. Today, many websites that provide driving directions also make their maps available to developers. Using these mapping APIs, you can plot your own points or...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008
Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008

Adaptive Hypermedia has emerged as an important area of both academic and deployed research. It encompasses a broad range of research that will enable personalized, adaptive hypermedia systems to play an even more effective role in people’s lives. The Web has enabled the widespread use of many personalized systems, such as recommenders,...

Information Sharing on the Semantic Web
Information Sharing on the Semantic Web

The rapid progress of the “information society” in the past decade has been made possible by the removal of many technical barriers. Producing, storing, and transporting information in large quantities are no longer significant problems.

Producing on-line, digitized information is no longer a problem. Ever more of our...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Desktop Witness: The Do's and Don'ts of Personal Computer Security
Desktop Witness: The Do's and Don'ts of Personal Computer Security

When asked 'who are you?', people in different cultures tend to define themselves fundamentally differently in terms of what their respective culture considers to be most important. In cultures where one's professional and economic status is most important, people say 'I am an engineer', or 'a priest at St...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Using CiviCRM
Using CiviCRM

Donald Lobo, Michal Mach, and I started CiviCRM almost six years ago. Back then, open source software had gained traction in the operating system arena, but the idea of an open source application designed from the ground up to meet the needs of non-profits and other civic sector organizations was pretty radical. We were convinced that there...

Result Page: 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy