The book results from a collaboration between leading academics in the field, the wider group of authors having had input into each of the chapters. Through the development of a deep understanding of technology, based on a thoughtful philosophy, pathways are discussed to facilitate student learning opportunities in technology education. Consideration is given to the purpose(s) of technology edu…
This volume contains the refereed proceedings of the 13th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2015, held in September 2015 in Lexington, KY, USA. The 290long and 11 short papers presented together with 3 invited talks, the paper reporting on the Answer Set Programming competition, and four papers presented by LPNMR student attendees at the doctoral co…
This anthology of the very latest research on truth features the work of recognized luminaries in the field, put together following a rigorous refereeing process. Along with an introduction outlining the central issues in the field, it provides a unique and unrivaled view of contemporary work on the nature of truth, with papers selected from key conferences in 2011 such as Truth Be Told (Amster…
The two-volume set LNCS 9172 and 9173 constitutes the refereed proceedings of the Human Interface and the Management of Information thematic track, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015, jointly with 15 other thematically similar conferences. The total of 1462 papers and 246 posters presented at t…
This book constitutes the proceedings of the 6th International Workshop on Human Behavior Understanding, HBU 2015, held in Osaka, Japan, in September 2015. The 11 full papers were carefully reviewed and selected from 15 initial submissions. They are organized in topical sections named: interaction with elderly, learning behavior patterns, and mobile solutions.
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
Pusat gravitasi dalam studi Romawi telah bergeser jauh dari eselon atas pemerintahan dan administrasi di Roma atau istana Kaisar ke provinsi dan individu. Studi multidisiplin yang disajikan dalam volume ini mencerminkan perubahan dalam sejarah Romawi pada identitas kelompok etnis dan bahkan individu lajang yang tinggal di kerajaan multinasional Roma yang luas. Tujuannya kurang untuk menemukan e…
The contribution of genomic variants to the aetiopathogenesis of both paediatric and adult neurological disease is being increasingly recognized. The use of next-generation sequencing has led to the discovery of novel neurodevelopmental disorders, as exemplified by the deciphering developmental disorders (DDD) study, and provided insight into the aetiopathogenesis of common adult neurological d…
Overuse has become a major issue of healthcare quality, safety, and sustainability around the world. In this Element, the authors discuss concepts, terminology, and the history of concerns.
This thesis presents a theoretical and experimental approach for the rapid fabrication, optimization and testing of holographic sensors for the quantification of pH, organic solvents, metal cations, and glucose in solutions. Developing non-invasive and reusable diagnostics sensors that can be easily manufactured will support the monitoring of high-risk individuals in any clinical or point-of…