Advances in computers. Vol. 70 /
The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpin...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam :
Academic Press,
2007.
|
Colección: | Advances in computers,
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- Cover; Copyright page; Contents; Contributors; Preface; Chapter 1. Designing Networked Handheld Devices to Enhance School Learning; 1. Introduction; 2. Historical Large Scale Successes; 3. Technology Context for Learning Applications; 4. Overarching Ideas from the Learning Sciences; 5. Design of Instructional Technologies; 6. Looking Forward; 7. Conclusion; Acknowledgements; References; Chapter 2. Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering; 1. Introduction; 2. Related Work
- 3. A Model for Interactive Web-driven and Dialogue-based Search4. Analysis and Results; 5. Conclusions; Acknowledgements; References; Chapter 3. A Tour of Language Customization Concepts; 1. Introduction; 2. Languages, Abstraction and Domain-Specificity; 3. Derivation Types; 4. Lightweight Language Customization; 5. Customization Support Environments; 6. Ontological Metalevels; 7. Orthogonal Classification Architecture; 8. Languages versus Libraries; 9. Transformations; 10. Conclusion; References; Chapter 4. Advances in Business Transformation Technologies; 1. Introduction
- 2. Value-Oriented, Model-Driven Business Transformation3. Model-Driven Ontology Engineering; 4. Business Process Composition with Web Services; Acknowledgements; Appendix A: Acronyms; References; Chapter 5. Phish Phactors: Offensive and Defensive Strategies; 1. Introduction; 2. Core Phishing Techniques; 3. Advanced Phishing Techniques; 4. Anti-Phishing Techniques; 5. Comprehensive Anti-Phishing Efforts; 6. Conclusion; Acknowledgements; References; Chapter 6. Reflections on System Trustworthiness; 1. A Total-System Perspective; 2. Anticipating Disasters; 3. Trustworthiness
- 4. Risks in Trusting Untrustworthiness5. Principles for Developing Trustworthy Systems; 6. System Composition: Problems and Potentials; 7. A Crisis in Information System Security; 8. Optimistic Optimization; 9. An Example: Risks in Electronic Voting Systems; 10. The Need for Risk Awareness; 11. Risks of Misinformation; 12. Boon or Bane?; Acknowledgements; References; Author Index; Subject Index; Contents of Volumes in this Series