This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
In diesem Open-Access-Buch stehen die wirtschaftliche Verwertung von Daten und die dazu gehörenden technischen und organisatorischen Prozesse und Strukturen in Unternehmen im Fokus. Es behandelt Themen wie Datenmonetarisierung, Datenverträge, Data Governance, Informationssicherheit, Datenschutz und die Vertrauenswürdigkeit von Daten.
This open access book discusses the most modern approach to auditing complex digital systems and technologies. It combines proven auditing approaches, advanced programming techniques and complex application areas, and covers the latest findings on theory and practice in this rapidly developing field. Especially for those who want to learn more about novel approaches to testing complex informati…
This open access book systematically investigates the topic of entity alignment, which aims to detect equivalent entities that are located in different knowledge graphs. Entity alignment represents an essential step in enhancing the quality of knowledge graphs, and hence is of significance to downstream applications, e.g., question answering and recommender systems. Recent years have witnessed …
Machine learning - programming computers to learn from data - has spread across scientific disciplines, media, entertainment, and government. Medical research, autonomous vehicles, credit transaction processing, computer gaming, recommendation systems, finance, surveillance, and robotics use machine learning. Machine learning devices (sometimes understood as scientific models, sometimes as oper…
"When "metadata" became breaking news, appearing in stories about surveillance by the National Security Agency, many members of the public encountered this once-obscure term from information science for the first time. Should people be reassured that the NSA was "only" collecting metadata about phone calls -- information about the caller, the recipient, the time, the duration, the location -- a…
Penalaran tentang pengetahuan--khususnya pengetahuan agen yang bernalar tentang dunia dan pengetahuan satu sama lain--dulunya hanya dilakukan oleh para filsuf dan pemecah teka-teki. Baru-baru ini, jenis penalaran ini terbukti memainkan peran penting dalam sejumlah konteks yang mengejutkan, mulai dari memahami percakapan hingga analisis algoritma komputer terdistribusi. Penalaran Tentang Pengeta…
This book provides an overview of the recent advances in representation learning theory, algorithms, and applications for natural language processing (NLP), ranging from word embeddings to pre-trained language models. It is divided into four parts. Part I presents the representation learning techniques for multiple language entries, including words, sentences and documents, as well as pre-train…
Memberikan tinjauan menyeluruh tentang literatur dan penelitian terkait, Menjelaskan strategi penjadwalan yang sadar kualitas untuk pembaruan transfer status dan pembaruan transfer operasi, Menyajikan prototipe penjadwal yang sadar kualitas dan mendemonstrasikan kueri linimasa pada aplikasi Microblogging ;;; Buku ini secara komprehensif mengilustrasikan penjadwalan perangkat lunak berkualitas d…
The evolution of activism against the expansion of copyright in the digital domain, with case studies of resistance including eBook and iTunes hacks.OCLC-licensed vendor bibliographic record.