Home | Amazing | Today | Tags | Publishers | Years | Search 
Understanding Knowledge as a Commons: From Theory to Practice
Understanding Knowledge as a Commons: From Theory to Practice
Knowledge in digital form offers unprecedented access to information through the Internet but at the same time is subject to ever-greater restrictions through intellectual property legislation, overpatenting, licensing, overpricing, and lack of preservation. Looking at knowledge as a commons--as a shared resource--allows us to understand both its...
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!

Cooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. The work is written in a collaborative manner by several authors from Asia, America, and Europe. Twenty chapters introduce and...

Human-Centered Software Engineering - Integrating Usability in the Software Development Lifecycle
Human-Centered Software Engineering - Integrating Usability in the Software Development Lifecycle

The fields of HCI and Software Engineering have evolved almost independently of each other until the last decade, when it became apparent that an integrated and combined perspective would benefit the development of interactive software applications. The chapters in this book are written by prominent researchers who bring to light the major...

Swarm Intelligent Systems (Studies in Computational Intelligence)
Swarm Intelligent Systems (Studies in Computational Intelligence)
This volume offers a wide spectrum of sample works developed in leading research throughout the world about innovative methodologies of swarm intelligence and foundations of engineering swarm intelligent systems as well as applications and interesting experiences using the particle swarm optimisation. Swarm intelligence is an innovative...
Raw Workflow from Capture to Archives: A Complete Digital Photographer's Guide to Raw Imaging
Raw Workflow from Capture to Archives: A Complete Digital Photographer's Guide to Raw Imaging
'Raw Workflow from Capture to Archives' provides specific, practical explanations and how-to instructions for the digital photographer mastering this process. The most comprehensive book devoted to simplifying raw workflow, this guide will demystify raw functions in the camera, raw converter, image processing and enhancement software, and digital...
Future Interaction Design
Future Interaction Design
The perspectives and techniques used in human-computer interaction design, practice and research are broadening. This book looks at emerging approaches which are likely to contribute to the discipline in near future. The emphasis is on the social, cognitive, emotional, creative and active dimensions of the human actor. The underlying idea is that...
Trust in Knowledge Management and Systems in Organizations
Trust in Knowledge Management and Systems in Organizations

Trust in Knowledge Management and Systems in Organizations aims at tying trust to knowledge management (KM). It highlights the complexity of the invisible phenomenon of trust challenged by the global economy. Fresh insights, novel theoretical frameworks, and empirical results and ideas for future research are presented that differ from...

The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

Testing Web Security: Assessing the Security of Web Sites and Applications
Testing Web Security: Assessing the Security of Web Sites and Applications
Protect your company’s Web site from hack attacks with this guide to proven security-testing techniques

It’s only a matter of time before an unscrupulous would-be intruder decides to attack your organization’s Web site. If they’re successful, you could lose confidential customer information, intellectual property, or...

Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer forensics and intrusion forensics are rapidly becoming
mainstream activities in an increasingly online society due to the
ubiquity of computers and computer networks. We make daily use of
computers either for communication or for personal or work transactions.
From our desktops and laptops we access Web servers, e-mail
...
Information Architecture for the World Wide Web
Information Architecture for the World Wide Web

The post-Ajaxian Web 2.0 world of wikis, folksonomies, and mashups makes well-planned information architecture even more essential. How do you present large volumes of information to people who need to find what they're looking for quickly? This classic primer shows information architects, designers, and web site developers how to build...

Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)
Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)

Medical Informatics and biomedical computing have grown in quantum measure over the past decade. An abundance of advances have come to the foreground in this field with the vast amounts of biomedical and genomic data, the Internet, and the wide application of computer use in all aspects of medical, biological, and health care research and...

Result Page: 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy