This book focuses on a range of topics in design, such as universal design, design for all, digital inclusion, universal usability, and accessibility of technologies independently of people’s age, economic situation, education, geographic location, culture and language. It especially focuses on accessibility for people with auditory, cognitive, neurological, and visual impairments, ageing pop…
This book constitutes the thoroughly refereed proceedings of the 19th East European Conference on Advances in Databases and Information Systems, ADBIS 2015, held in Poitiers, France, in September 2015. The 31 full papers and 18 short papers presented were carefully selected and reviewed from 135 submissions. The papers are organized in topical sections such as database theory and access methods…
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sect…
This undergraduate statistical quality assurance textbook clearly shows with real projects, cases and data sets how statistical quality control tools are used in practice. Among the topics covered is a practical evaluation of measurement effectiveness for both continuous and discrete data. Gauge Reproducibility and Repeatability methodology (including confidence intervals for Repeatability,…
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic …
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic …
This book describes current problems in data science and Big Data. Key topics are data classification, Graph Cut, the Laplacian Matrix, Google Page Rank, efficient algorithms, hardness of problems, different types of big data, geometric data structures, topological data processing, and various learning methods. For unsolved problems such as incomplete data relation and reconstruction, the book…
This book compiles and presents new developments in statistical causal inference. The accompanying data and computer programs are publicly available so readers may replicate the model development and data analysis presented in each chapter. In this way, methodology is taught so that readers may implement it directly. The book brings together experts engaged in causal inference research to prese…
In Nightwood Theatre, Scott describes the company’s journey toward defining itself as a feminist theatre establishment, highlighting its artistic leadership based on its relevance to diverse communities of women. She also traces Nightwood’s relationship with the media and places the theatre in an international context by comparing its history to that of like companies in the U.K. and the U.S
Technology, a word that emerged historically first to denote the study of any art or technique, has come, in modernity, to describe advanced machines, industrial systems, and media. McCutcheon argues that it is Mary Shelley’s 1818 novel Frankenstein that effectively reinvented the meaning of the word for modern English. It was then Marshall McLuhan’s media theory and its adaptations in Cana…