Browse Items (52 total)

  • Collection: 000 Computer Science, Knowledge & Systems

Real-Life Decision-Making.jpg
Have you ever experienced a decision situation that was hard to come to grips with? Did you ever feel a need to improve your decision-making skills? Is this something where you feel that you have not learned enough practical and useful methods? In…

Reversible Computation.jpg
This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a…

Rights for Robots.jpg
Computer Science, Engineering & Technology, Environment and Sustainability, Law, Politics & International Relations, Social Sciences

9781000626483.pdf[1].jpg
Robots and artificial intelligence (AI) are powerful forces that will likely have large impacts on the size, direction, and composition of international trade flows. This book discusses how industrial robots, automation, and AI affect international…

978-3-031-09357-9.jpg
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021.
The 9 papers presented together with 1…

Shaping the Future of IoT with Edge Intelligence.jpg
This book presents the technologies that empower edge intelligence, along with their use in novel IoT solutions. Specifically, it presents how 5G/6G, Edge AI, and Blockchain solutions enable novel IoT-based decentralized intelligence use cases at the…

silicon valley.jpg
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and…

SymmetryAdapted_Machine_Learning_for_Information_Security_cover.jpg
Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing…

1002212.pdf.jpg
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In…

The Impact Challenge.jpg
This book explores the role of businesses in delivering positive societal and financial outcomes as they seek to bridge the gap between short-term organizational behaviors and long-range sustainability commitments. By addressing the inevitable data…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2