The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
'Thank you for your order, Mr Mainframe Customer. The cost is £5 million and the lead-time for manufacture will be two years. In the meantime you will have to build a special computer centre to our specification. For our part, our project team will help you recruit and train potential programmers and we shall advise on how you might use the system.' How different from today when the customer…
With changes in technology and a renewed effort to catalog the world's biodiversity, huge amounts of data are being generated on biodiversity issues. As response to the call for better information systems to manage the biodiversity crisis, a wide range of solutions are being developed for inventorying, managing, and disseminating taxonomic data. This book brings together a diverse array of auth…
This open access book addresses the protection of privacy and personality rights in public records, records management, historical sources, and archives; and historical and current access to them in a broad international comparative perspective. Considering the question “can archiving pose a security risk to the protection of sensitive data and human rights?”, it analyses data security and …
The ADMD3 approach presented in this book enchances the architectural design documentation of decision via reuse of design patterns. It combines the support for evaluation of pattern application, semi-automated documentation of decision rationale and trace links. The approach is based on a new kind of design pattern catalogue, whereby usual pattern descriptions are captured together with questi…
What consequences does the design of the virtual yield for architecture and to what extent can the nature of architecture be used productively to turn game-worlds into sustainable places - over here, in »reality«? This pioneering collection gives an overview of contemporary developments in designing video games and of the relationships such practices have established with the design of archit…
This reprint covers new aspects of the recent developments in the theory and applications of fractional differential equations, including inclusions, inequalities, and systems of fractional differential equations with Riemann-Liouville derivatives, Caputo derivatives, or other generalized fractional derivatives, subject to various boundary conditions. The authors study the existence, uniqueness…
This eBook is a collection of articles from a Frontiers Research Topic. Frontiers Research Topics are very popular trademarks of the Frontiers Journals Series: they are collections of at least ten articles, all centered on a particular subject. With their unique mix of varied contributions from Original Research to Review Articles, Frontiers Research Topics unify the most influential researcher…
The relationship between individuality and aggregation is an important topic in Complex Systems Science, as both aspects are facets of emergence. This problem has generally been addressed by adopting a classical individual- versus population-level approach, in which boundaries emerge in segregated communities. More specifically, boundaries delimiting and interconnecting aggregates are at play. …
Visual perception is one of the most important sources of information for both humans and robots. A particular challenge is the acquisition and interpretation of complex unstructured scenes. This work contributes to active vision for humanoid robots. A semantic model of the scene is created, which is extended by successively changing the robot's view in order to explore interaction possibilitie…