You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Nowadays knowledge-based systems research and development essentially employs two paradigms of reasoning. There are on the one hand the logic-based approaches where logic is to be understood in a rather broad sense; usually these approaches are used in symbolic domains where numerical calculations are not the core challenge. On the other hand we find approximation oriented reasoning; methods of these kinds are mainly applied in numerical domains where approximation is part of the scientific methodology itself. However, from an abstract level all these approaches do focus on similar topics and arise on various levels such as problem modeling, inference and problem solving techniques, algorithms and mathematical methods, mathematical relations between discrete and continuous properties, and are integrated in tools and applications. In accordance with the unifying vision and research interest of Michael M. Richter and in correspondence to his scientific work, this book presents 13 revised full papers advocating the integration of logic-based and approximation-oriented approaches in knowledge processing.
Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
This book traces the gendering of women's work and technology from its historical roots in factories, offices, IT companies, and hospitals to contemporary workplaces including platform- and AI-based work. It adopts a feminist/intersectional perspective on design with a focus on norm-critical, social justice-oriented, and decolonizing approaches.
In this interdisciplinary anthology, essays study the relationship between the imagination and images both material and mental. Through case studies on a diverse array of topics including photography, film, sports, theater, and anthropology, contributors focus on the role of the creative imagination in seeing and producing images and the imaginary.
Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society presents different views about how terrorist actions are influencing political and social discussions and decisions, and it covers questions related to legitimacy and power in the Information Society. Ethical principles are important guidelines for responsible behavior of IT professionals. But even under strong external pressure, long ranging aspects such as education and the roles of developing countries in the Information Society are important to discuss, especially to enable all to actively participate in information processes.
This volume contains the papers which were presented to the workshop "Computer-Science Logic" held in Karlsruhe on October 12-16, 1987. Traditionally Logic, or more specifically, Mathematical Logic splits into several subareas: Set Theory, Proof Theory, Recursion Theory, and Model Theory. In addition there is what sometimes is called Philosophical Logic which deals with topics like nonclassical logics and which for historical reasons has been developed mainly at philosphical departments rather than at mathematics institutions. Today Computer Science challenges Logic in a new way. The theoretical analysis of problems in Computer Science for intrinsic reasons has pointed back to Logic. A broad...
In Memory of Dieter Rötting. 24.8.1937 - 4.6.1984. On the Occasion of the 50th Anniversary of His Birth
The knowledge-based management of medical acts in NUCLEUS -- Knowledge Acquisition, Representation & Learning -- Knowledge Representation and Modelling in HYBRIKON -- Knowledge Organisation in Medical KBS Construetion -- A Framework for Modular Knowledge Bases in the Domain of Hypertension Diseases -- KAVAS-2: Knowledge Acquisition, Visualisation and Assessment System -- KAVAS's Framework for quality assessment of medical knowledge -- KAVAS's Conditioning of the Induction Algorithm -- Clinical decision-support in the field of TETANUS serology using an associative storage model implemented in LISP -- Model based learning support to knowledge acquisition: A clinical case study -- MODELS FOR ME...
This volume can be divided into two parts: a purely mathematical part with contributions on finance mathematics, interactions between geometry and physics and different areas of mathematics; another part on the popularization of mathematics and the situation of women in mathematics.
This book discusses the legacy of the conference series The International Conferences of Women Engineers and Scientists (ICWES), which spans the second half of the Twentieth Century and the beginning of the twenty-first. The book first discusses how, at a time when there were few women engineers and scientists, a group of women organized a conference, in June 1964 in New York, which attracted 486 women. They presented their scientific achievements and discussed how to attract more women in STEM. This effort was carried out by volunteers, continuing the ICWES conferences over a period of 59 years. The authors discuss the organizers, the hosting societies, the scientific content, the changes i...