Browse Items (52 total)

  • Collection: 000 Computer Science, Knowledge & Systems

largepreview.png
This Open Access book, building on research initiated by scholars from the Leiden-Delft-Erasmus Centre for Global Heritage and Development (CHGD) and ICOMOS Netherlands, presents multidisciplinary research that connects water to heritage. Through…

Tags:

1002212.pdf.jpg
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In…

external_content.pdf.jpg
This book shows how the vision for open access to scientific data can be more readily achieved through a staged model that research funders, policy makers, scientists, and research organizations can adopt in their practice. Drawing on her own…

Mobile Research Methods.jpg
Daily activity sees data constantly flowing through cameras, the internet, satellites, radio frequencies, sensors, private appliances, cars, smartphones, tablets and the like. Among all the tools currently used, mobile devices, especially mobile…

cover45.jpg
Knowledge in the Age of Digital Capitalism proposes a new critical theory concerning the functioning of capitalism and how we consider knowledge and information. This ambitious book systematically and lucidly introduces contemporary phenomena into…

cover32.jpg
For more than 30 years, certain governments, individuals and organisations have actively promoted computers as learning technologies. Enormous amounts of money and time have been spent promoting specific kinds of educational computing, and policies…

cover31.jpg
Computer Systems Organization and Communication Networks; Software Engineering; Complex Systems; Information Systems Applications (incl. Internet); Computer Applications

Advances in Data Mining_cover.jpg
dvances in Data Mining Knowledge Discovery and Applications aims to help data miners, researchers, scholars, and PhD students who wish to apply data mining techniques. The primary contribution of this book is highlighting frontier fields and…

SymmetryAdapted_Machine_Learning_for_Information_Security_cover.jpg
Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing…

buku 3.jpg
This book explores the critical role of acquisition, application, enhancement, and management of knowledge and human competence in the context of the largely digital and data/information dominated modern world. Whilst humanity owes much of its…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2