Advances in Computers -

Advances in Computers (eBook)

Marvin Zelkowitz (Herausgeber)

eBook Download: PDF
2011 | 1. Auflage
358 Seiten
Elsevier Science (Verlag)
978-0-08-052441-2 (ISBN)
Systemvoraussetzungen
149,00 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume includes six chapters on hardware development in the educational market, intelligent search strategies, domain specific languages and trustworthiness and risks in computer technology.

The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.

- Trustworthiness and risks in computer technology
- K-12 educational use of inexpensive handheld devices
- Domain specific languages
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume includes six chapters on hardware development in the educational market, intelligent search strategies, domain specific languages and trustworthiness and risks in computer technology. The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described. Trustworthiness and risks in computer technology K-12 educational use of inexpensive handheld devices Domain specific languages

Cover 1
Copyright page 5
Contents 6
Contributors 10
Preface 14
Chapter 1. Designing Networked Handheld Devices to Enhance School Learning 16
1. Introduction 17
2. Historical Large Scale Successes 21
3. Technology Context for Learning Applications 35
4. Overarching Ideas from the Learning Sciences 47
5. Design of Instructional Technologies 58
6. Looking Forward 62
7. Conclusion 64
Acknowledgements 66
References 67
Chapter 2. Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering 76
1. Introduction 77
2. Related Work 79
3. A Model for Interactive Web-driven and Dialogue-based Search 88
4. Analysis and Results 104
5. Conclusions 115
Acknowledgements 116
References 116
Chapter 3. A Tour of Language Customization Concepts 120
1. Introduction 121
2. Languages, Abstraction and Domain-Specificity 122
3. Derivation Types 135
4. Lightweight Language Customization 142
5. Customization Support Environments 148
6. Ontological Metalevels 153
7. Orthogonal Classification Architecture 163
8. Languages versus Libraries 165
9. Transformations 169
10. Conclusion 174
References 175
Chapter 4. Advances in Business Transformation Technologies 178
1. Introduction 180
2. Value-Oriented, Model-Driven Business Transformation 184
3. Model-Driven Ontology Engineering 202
4. Business Process Composition with Web Services 218
Acknowledgements 233
Appendix A: Acronyms 233
References 234
Chapter 5. Phish Phactors: Offensive and Defensive Strategies 238
1. Introduction 240
2. Core Phishing Techniques 248
3. Advanced Phishing Techniques 257
4. Anti-Phishing Techniques 269
5. Comprehensive Anti-Phishing Efforts 276
6. Conclusion 280
Acknowledgements 280
References 280
Chapter 6. Reflections on System Trustworthiness 284
1. A Total-System Perspective 285
2. Anticipating Disasters 286
3. Trustworthiness 288
4. Risks in Trusting Untrustworthiness 290
5. Principles for Developing Trustworthy Systems 292
6. System Composition: Problems and Potentials 300
7. A Crisis in Information System Security 309
8. Optimistic Optimization 310
9. An Example: Risks in Electronic Voting Systems 312
10. The Need for Risk Awareness 315
11. Risks of Misinformation 317
12. Boon or Bane? 319
Acknowledgements 321
References 321
Author Index 326
Subject Index 334
Contents of Volumes in this Series 350

PDFPDF (Adobe DRM)
Größe: 5,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich