You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents a review of traditional context-aware computing research, identifies its limitations in developing social context-aware pervasive systems, and introduces a new technology framework to address these limitations. Thus, this book provides a good reference for developments in context-aware computing and pervasive social computing. It examines the emerging area of pervasive social computing, which is a novel collective paradigm derived from pervasive computing, social media, social networking, social signal processing and multimodal human-computer interaction. This book offers a novel approach to model, represent, reason about and manage different types of social context. It sh...
This volume constitutes the refereed proceedings of the confederated international conferences: Cooperative Information Systems (CoopIS 2013), Distributed Objects and Applications (DOA-Trusted Cloud 2013), and Ontologies, Data Bases and Applications of SEmantics (ODBASE 2013) held as part of OTM 2013 in September 2013 in Graz, Austria. The 47 revised full papers presented together with 6 short papers and 5 keynotes were carefully reviewed and selected from a total of 137 submissions. The papers are organized in topical sections on business process management; process modelling; service management; social networking; models and schemas; technical advances in cloud computing; towards trusted cloud computing; privacy for the cloud; querying and mining semantic information; semantic matching and mapping; semantic information management; semantics in use.
This book constitutes the refereed proceedings of the 24th International Conference on Advanced Information Systems Engineering, CAiSE 2012, held in Gdansk, Poland, in June 2012. The 42 revised full papers, 2 full-length invited papers and 4 short tutorial papers, were carefully reviewed and selected from 297 submissions. The contributions have been grouped into the following topical sections: business process model analysis; service and component composition; language and models; system variants and configuration; process mining; ontologies; requirements and goal models; compliance; monitoring and prediction; services; case studies; business process design; feature models and product lines; and human factors.
This book seeks to extricate the complexities of this phenomenon by including insights from criminology, psychology and technology. It examines the many-sided nature of cybercriminal behaviour, from the motivations behind these acts to the psychological profiles of offenders and highlights the critical need for effective prevention and rehabilitation strategies. By examining the case studies, criminological theories and innovative rehabilitation approaches, the author aims to equip readers with a deeper understanding of this phenomenon.
This book constitutes the refereed proceedings of the 11th International Conference on Persuasive Technology, PERSUASIVE 2016, held in Salzburg, Austria, in April 2016. The 27 revised full papers and 3 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers are grouped in topical sections on individual differences, theoretical reflections, prevention and motivation, methods and models, games and gamification, interventions for behavior change, and design strategies and techniques.
Combining and integrating cross-institutional data remains a challenge for both researchers and those involved in patient care. Patient-generated data can contribute precious information to healthcare professionals by enabling monitoring under normal life conditions and also helping patients play a more active role in their own care. This book presents the proceedings of MEDINFO 2019, the 17th World Congress on Medical and Health Informatics, held in Lyon, France, from 25 to 30 August 2019. The theme of this year’s conference was ‘Health and Wellbeing: E-Networks for All’, stressing the increasing importance of networks in healthcare on the one hand, and the patient-centered perspectiv...
This book focuses on signal processing techniques used in computational health informatics. As computational health informatics is the interdisciplinary study of the design, development, adoption and application of information and technology-based innovations, specifically, computational techniques that are relevant in health care, the book covers a comprehensive and representative range of signal processing techniques used in biomedical applications, including: bio-signal origin and dynamics, sensors used for data acquisition, artefact and noise removal techniques, feature extraction techniques in the time, frequency, time–frequency and complexity domain, and image processing techniques i...
This volume explores how context has been and can be used in computing to model human behaviors, actions and communications as well as to manage data and knowledge. It addresses context management and exploitation of context for sharing experience across domains. The book serves as a user-centric guide for readers wishing to develop context-based applications, as well as an intellectual reference on the concept of context. It provides a broad yet deep treatment of context in computing and related areas that depend heavily on computing. The coverage is broad because of its cross-disciplinary nature but treats topics at a sufficient depth to permit a reader to implement context in his/her comp...
This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have...