You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2020, held in Ebène City, Mauritius, in December 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers were carefully selected from 90 submissions. The papers are organized in four thematic sections on dynamic spectrum access and mesh networks; wireless sensing and 5G networks; software-defined networking; Internet of Things; e-services and big data; DNS resilience and performance.
Since the 2016 U.S. presidential election, concerns about fake news have fostered calls for government regulation and industry intervention to mitigate the influence of false content. These proposals are hindered by a lack of consensus concerning the definition of fake news or its origins. Media scholar Nolan Higdon contends that expanded access to critical media literacy education, grounded in a comprehensive history of fake news, is a more promising solution to these issues. The Anatomy of Fake News offers the first historical examination of fake news that takes as its goal the effective teaching of critical news literacy in the United States. Higdon employs a critical-historical media ecosystems approach to identify the producers, themes, purposes, and influences of fake news. The findings are then incorporated into an invaluable fake news detection kit. This much-needed resource provides a rich history and a promising set of pedagogical strategies for mitigating the pernicious influence of fake news.
"Graphs. Such a simple idea. Map a problem onto a graph then solve it by searching over the graph or by exploring the structure of the graph. What could be easier? Turns out, however, that working with graphs is a vast and complex field. Keeping up is challenging. To help keep up, you just need an editor who knows most people working with graphs, and have that editor gather nearly 70 researchers to summarize their work with graphs. The result is the book Massive Graph Analytics." — Timothy G. Mattson, Senior Principal Engineer, Intel Corp Expertise in massive-scale graph analytics is key for solving real-world grand challenges from healthcare to sustainability to detecting insider threats, cyber defense, and more. This book provides a comprehensive introduction to massive graph analytics, featuring contributions from thought leaders across academia, industry, and government. Massive Graph Analytics will be beneficial to students, researchers, and practitioners in academia, national laboratories, and industry who wish to learn about the state-of-the-art algorithms, models, frameworks, and software in massive-scale graph analytics.
This open access book describes Smittestopp, the first Norwegian system for digital contact tracing of Covid-19 infections, which was developed in March and early April 2020. The system was deployed after five weeks of development and was active for a little more than two months, when a drop in infection levels in Norway and privacy concerns led to shutting it down. The intention of this book is twofold. First, it reports on the design choices made in the development phase. Second, as one of the only systems in the world that collected population data into a central database and which was used for an entire population, we can share experience on how the design choices impacted the system's operation. By sharing lessons learned and the challenges faced during the development and deployment of the technology, we hope that this book can be a valuable guide for experts from different domains, such as big data collection and analysis, application development, and deployment in a national population, as well as digital tracing.
This book constitutes the refereed proceedings of the 13th International Conference on Passive and Active Measurement, PAM 2012, held in Vienna, Austria, in March 2012. The 25 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers were arranged into eight sessions traffic evolution and analysis, large scale monitoring, evaluation methodology, malicious behavior, new measurement initiatives, reassessing tools and methods, perspectives on internet structure and services, and application protocols.
This proceedings book presents the latest research findings, and theoretical and practical perspectives on innovative methods and development techniques related to the emerging areas of Web computing, intelligent systems and Internet computing. The Web has become an important source of information, and techniques and methodologies that extract quality information are of paramount importance for many Web and Internet applications. Data mining and knowledge discovery play a key role in many of today's major Web applications, such as e-commerce and computer security. Moreover, Web services provide a new platform for enabling service-oriented systems. The emergence of large-scale distributed com...
This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications h...
Governments across the globe find themselves in an exploratory phase as they probe the limits of their sovereignty in the cyber domain. Cyberspace is a singular environment that is forcing states to adjust their behavior to fit a new arena beyond the four traditional domains (air, sea, space, and land) to which the classic understanding of state sovereignty applies. According to Lucie Kadlecová, governments must implement a more adaptive approach to keep up with rapid developments and innovations in cyberspace in order to truly retain their sovereignty. This requires understanding the concept of sovereignty in a more creative and flexible manner. Kadlecová argues that the existence of sove...
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2017, held in Lagos, Nigeria, in December 2017. The 19 full papers, 12 short papers and 5 workshop papers were carefully selected from 81 submissions. The papers were presented in eight sessions: e-government, network and load management, digital inclusion, knowledge extraction, representation and sharing, networks and communications, ICT applications for development, decision support, e-business and e-services, internet measurement.
Surveillance Education explores the pervasive use of digital surveillance technologies in schools and assesses its pernicious effects on students. Recognizing that the use of digital technologies will persist, the authors instead offer practical ways to ameliorate their impact. In our era of surveillance capitalism, digital media technologies are ever more intertwined into the educational process. Schools are presented with digital technologies as tools of convenience for gathering and grading student work, as tools of support to foster a more equitable learning environment, and as tools of safety for predicting or preventing violence or monitoring mental, emotional, and physical health. Des...