This book constitutes the refereed conference proceedings of the 13th International Symposium, W2GIS 2014, held in Seoul, South Korea, in May 2014. The 12 revised full papers presented were carefully ...
This special issue of AoIS presents cutting-edge research on these often contradictory trends in computing and will support discussion on the synergies and controversies of the two techniques, while considering what other technologies can contribute to both.
This book is the first to integrate the business implications of Web 2.0. It emphasizes three major components—social networks analysis, recommendation systems and community building—and offers case studies of business models that use 2.0.
This book features pioneering and cutting-edge research work that is pointing to the future of the Web. It covers such topics as semantic web services, location-based applications, personalized and context-dependent user interfaces, and social networks.
This textbook brings together both new and traditional research methods in Human Computer Interaction (HCI). Research methods include interviews and observations, ethnography, grounded theory and anal ...
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.
Voice over IP Security examines the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. The text also identifies current areas of risk and deficiencies in the research.
Visualization for computer security (VizSec) developers take advantage of the power of the human brain in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.