Human Factors of Stereoscopic Displays provides an overview of all vision-relevant topics and issues that inform stereo display design from a user-centric or human factor, perspective. Although both the basic vision science literature and the applied literature will be reviewed, the strength and originality of this book comes from the emphasis on the basic science literature on human stereo vis…
This book constitutes revised selected papers from the refereed proceedings of the First Human Centered Computing Conference, HCC 2014, that consolidated and further develops the successful ICPCA/SWS conferences on Pervasive Computing and the Networked World. The 54 full papers and 30 short papers presented in this volume were carefully reviewed and selected from 152 submissions. These proceedi…
The complexity of technical systems increases, breakdowns occur quite often. The mission of organic computing is to tame these challenges by providing degrees of freedom for self-organised behaviour. To achieve these goals, new methods have to be developed. The proposed observer/controller architecture constitutes one way to achieve controlled self-organisation. To improve its design, multi-age…
The two LNCS volume set 9193-9194 constitutes the refereed proceedings of the First International Conference on Human Aspects of IT for the Aged Population, ITAP 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015, jointly with 15 other thematically conferences. The total of 1462 papers and 246 posters pr…
The two LNCS volume set 9193-9194 constitutes the refereed proceedings of the First International Conference on Human Aspects of IT for the Aged Population, ITAP 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015, jointly with 15 other thematically conferences. The total of 1462 papers and 246 posters pr…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This open access book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by leading researchers, discuss the main techniques and applications, together with the advantages and shortcomings of these tools in comparison to other f…
When no samples are available to estimate a probability distribution, we have to invite some domain experts to evaluate the belief degree that each event will happen. Perhaps some people think that the belief degree should be modeled by subjective probability or fuzzy set theory. However, it is usually inappropriate because both of them may lead to counterintuitive results in this case. In o…
In this work we present a stand-off, long wave infrared (LWIR) spectroscopy system for remote detection of hazardous substances. The principle is based upon wavelength selective illumination using External Cavity Quantum Cascade Lasers, that are tunable in the LWIR wavelength range from 7.5 - 10 µm, in which most chemical substances exhibit a highly characteristic absorption behaviour.
This book presents a philosophical approach to probability and probabilistic thinking, considering the underpinnings of probabilistic reasoning and modeling, which effectively underlie everything in data science. The ultimate goal is to call into question many standard tenets and lay the philosophical and probabilistic groundwork and infrastructure for statistical modeling. It is the first book…