The case for a smarter “prosumer law” approach to Internet regulation that would better protect online innovation, public safety, and fundamental democratic rights. Internet use has become ubiquitous in the past two decades, but governments, legislators, and their regulatory agencies have struggled to keep up with the rapidly changing Internet technologies and uses. In this groundbreakin…
"Between 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation -- to construct a nationwide computer network. None of these attempts succeeded, and the enterprise had been abandoned by the time the Soviet Union fell apart. Meanwhile, ARPANET, the American precursor to the Internet, went online in 1969. Why did the Soviet network, with top-level scientists…
A hands-on approach to tasks and techniques in data stream mining and real-time analytics, with examples in MOA, a popular freely available open-source software framework.OCLC-licensed vendor bibliographic record.
For as long has humans have lived in communities, storytelling has bound people to each other and to their environments. In recent times, scholars have noted how social networks arise around issues of resource and ecological management. This book argues that stories, or narratives, play a key role in these networks - that environmental communities 'narrate themselves into existence'. The book p…
Sasan Adibi (BS’95, MS’99, MS’05, PhD’10, SMIEEE’11) has a PhD degree in Communication and Information Systems from University of Waterloo, Canada and the recipient of the best PhD thesis award from the IEEE Society. He is currently involved in the research, design, implementation, and application Electronic Health (eHealth) and Mobile Health (mHealth). Sasan’s research publication …
Providing an introduction to the field of applied ontology that is of particular relevance to biomedicine, this thorough book covers theoretical components of ontologies, best practices for ontology design, and examples of biomedical ontologies in use. --OCLC-licensed vendor bibliographic record.
This book is a collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2015. It contains twenty-one chapters in the field of Computational Intelligence, which received highly recommended feedback during SAI Conference 2015 review process. During the three-day event 260 scientists, technology developers, young re…
A foundational analysis of the co-evolution of the internet and international relations, examining resultant challenges for individuals, organizations, firms, and states. In our increasingly digital world, data flows define the international landscape as much as the flow of materials and people. How is cyberspace shaping international relations, and how are international relations shaping cyber…
"Today almost every aspect of life for which data exists can be rendered as a network. Financial data, social networks, biological ecologies: all are visualized in links and nodes, lines connecting dots. A network visualization of a corporate infrastructure could look remarkably similar to that of a terrorist organization. In An Aesthesia of Networks, Anna Munster argues that this uniformity ha…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…