You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This edited volume presents the best chapters presented during the international conference on computer and applications ICCA’17 which was held in Dubai, United Arab Emirates in September 2017. Selected chapters present new advances in digital information, communications and multimedia. Authors from different countries show and discuss their findings, propose new approaches, compare them with the existing ones and include recommendations. They address all applications of computing including (but not limited to) connected health, information security, assistive technology, edutainment and serious games, education, grid computing, transportation, social computing, natural language processing...
This book carries evidence of the plight and exploitation of floating sex workers in Dhaka, Bangladesh. The book contains an in-depth account of injustices that these workers experience due to lacking agency, and it instigates the debate whether prostitution is a form of work or exploitation. It examines the effectiveness of various socio-economic development programs that improve the socio-economic status of these floating sex workers, carried out by both national and international development actors. Additionally, the book looks at policy implications towards ensuring floating sex workers' entitlements, capabilities, and human rights. (Series: Spectrum. Berliner Series to Society, Economy and Politics in Developing Countries / Spektrum. Berliner Reihe zu Gesellschaft, Wirtschaft und Politik in Entwicklungslandern - Vol. 111) [Subject: Sociology, Asian Studies]
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
Researchers, academicians and professionals expone in this book their research in the application of intelligent computing techniques to software engineering. As software systems are becoming larger and complex, software engineering tasks become increasingly costly and prone to errors. Evolutionary algorithms, machine learning approaches, meta-heuristic algorithms, and others techniques can help the effi ciency of software engineering.
None
None