You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Florian Resatsch investigates the optimal strategies for developing and evaluating ubiquitous computing applications based on Near Field Communication. He offers a range of design guidelines for NFC applications in four categories: NFC technology, tag infrastructure, devices, and human factors.
Florian Resatsch investigates the optimal strategies for developing and evaluating ubiquitous computing applications based on Near Field Communication. He offers a range of design guidelines for NFC applications in four categories: NFC technology, tag infrastructure, devices, and human factors.
From basic concepts to research grade material and future directions, the Near Field Communications Handbook provides comprehensive technical coverage of this rapidly emerging field. Walking readers through emerging applications, it offers a glimpse at a future in which near field communication (NFC) technology is fully integrated into daily life.
Advances in hardware, software, and audiovisual rendering technologies of recent years have unleashed a wealth of new capabilities and possibilities for multimedia applications, creating a need for a comprehensive, up-to-date reference. The Encyclopedia of Multimedia Technology and Networking provides hundreds of contributions from over 200 distinguished international experts, covering the most important issues, concepts, trends, and technologies in multimedia technology. This must-have reference contains over 1,300 terms, definitions, and concepts, providing the deepest level of understanding of the field of multimedia technology and networking for academicians, researchers, and professionals worldwide.
This book presents the most interesting talks given at ISSE 2011 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Computing & Enterprise Security Services - Awareness, Education, Privacy & Trustworthiness - Smart Grids, Mobile & Wireless Security - Security Management, Identity & Access Management - eID & eGovernment - Device & Network Security Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.
"This multiple-volume publications exhibits the most up-to-date collection of research results and recent discoveries in the transfer of knowledge access across the globe"--Provided by publisher.
This book constitutes the refereed proceedings of the 9th ERCIM Workshop on User Interfaces for All, focusing on Universal Access in Ambient Intelligence Environments, held in Königswinter, Germany in September 2006. It covers interaction platforms and techniques for ambient intelligence, user and context awareness, inclusive design and evaluation, as well as access to information, education and entertainment.
None
Virtual and augmented reality raise significant questions for law and policy. When should virtual world activities or augmented reality images count as protected First Amendment ‘speech’, and when are they instead a nuisance or trespass? When does copying them infringe intellectual property laws? When should a person (or computer) face legal consequences for allegedly harmful virtual acts? The Research Handbook on the Law of Virtual and Augmented Reality addresses these questions and others, drawing upon free speech doctrine, criminal law, issues of data protection and privacy, legal rights for increasingly intelligent avatars, and issues of jurisdiction within virtual and augmented reality worlds.