"Today almost every aspect of life for which data exists can be rendered as a network. Financial data, social networks, biological ecologies: all are visualized in links and nodes, lines connecting dots. A network visualization of a corporate infrastructure could look remarkably similar to that of a terrorist organization. In An Aesthesia of Networks, Anna Munster argues that this uniformity ha…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This monograph presents a collection of major developments leading toward the implementation of white space technology - an emerging wireless standard for using wireless spectrum in locations where it is unused by licensed users. Some of the key research areas in the field are covered. These include emerging standards, technical insights from early pilots and simulations, software defined radio…
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health ca…
This book introduces inclusive-cost-effective (ICE) approaches that have the potential to transform all aspects of daily lives of people at the base of the pyramid in the economic scale, who represent more than 75% of the world population. ICE means that the approaches must meet the affordability level at the base of the pyramid. This includes mobile banking and financial service technologies, …
This book constitutes the refereed conference proceedings of the 14th International Symposium, W2GIS 2015, held in Grenoble, France, in May 2015. The 12 revised full papers presented were carefully selected from 19 submissions. Selected papers cover hot topics related to W2GIS including spatiotemporal data collection, processing and visualization, mobile user generated content, semantic trajec…
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificia…
This book constitutes the refereed proceedings of the 17th Asia-Pacific Conference APWeb 2015 held in Guangzhou, China, in September 2015. The 67 full papers and presented together with 3 industrial track papers and 7 demonstration track papers were carefully reviewed and selected from 146 submissions. The papers cover a wide spectrum of Web-related data management problems, and provide a th…
"This book provides a paradigm changing approach for protecting organizational email users from falling prey to social engineering"--OCLC-licensed vendor bibliographic record.
"An up-to-date synthesis of the neurocognitive theory of dreaming as presented by its founder"--OCLC-licensed vendor bibliographic record.