Browse Items (52 total)

  • Collection: 000 Computer Science, Knowledge & Systems

1002212.pdf.jpg
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In…

largepreview.png
This Open Access book, building on research initiated by scholars from the Leiden-Delft-Erasmus Centre for Global Heritage and Development (CHGD) and ICOMOS Netherlands, presents multidisciplinary research that connects water to heritage. Through…

Tags:

9781000895896.pdf.jpg
This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work…

Computational Engineering of Historical.jpg
Nanetti outlines a methodology for deploying artificial intelligence and machine learning to enhance historical research.

Historical events are the treasure of human experiences, the heritage that societies have used to remain resilient and…

The Impact Challenge.jpg
This book explores the role of businesses in delivering positive societal and financial outcomes as they seek to bridge the gap between short-term organizational behaviors and long-range sustainability commitments. By addressing the inevitable data…

Advancing Natural Language Processing.jpg
Advancing Natural Language Processing in Educational Assessment examines the use of natural language technology in educational testing, measurement, and assessment. Recent developments in natural language processing (NLP) have enabled large-scale…

Real-Life Decision-Making.jpg
Have you ever experienced a decision situation that was hard to come to grips with? Did you ever feel a need to improve your decision-making skills? Is this something where you feel that you have not learned enough practical and useful methods? In…

Certifications of Critical Systems.jpg
In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in…

Cybersecurity Public Sector Threats and Responses.jpg
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This…

Advances in Intelligent Robotics and Collaborative Automation.jpg
This book provides an overview of a series of advanced research lines in robotics as well as of design and development methodologies for intelligent robots and their intelligent components. It represents a selection of extended versions of the best…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2