Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Digital media has an impact on society's formative processes, forcing a pragmatic shift in their management and organization. This title defines a framework for understanding social changes produced by digital media.
Automatic identification has evolved to use mechanisms that can identify an object without direct human intervention. This book emphasizes the convergence and trajectory of automatic identification and location-based services toward chip implants and real-time positioning capabilities.
Develops a conceptual model for examining consumer adoption, usage, and impact of broadband utilizing various construct methodologies, thereby providing a window into the rational decisions of potential broadband consumers.
Presents a fundamental compendium of research on the health-care industry's adoption of information technologies from a multidisciplinary perspective.
Presents a review of leading advances in medical visualization and human-computer interaction. Suitable for researchers, scholars and healthcare practitioners, this book investigates the human roles during a visualization process, specifically motivation-based design, user-based design, and perception-and-cognitive-based design.
Providing a critical mass of research on the theory, practice, development, and implementation of tools for knowledge representation and agent-based architectures, this work intends to present a view of intelligent tutoring.
The Continuous Practice Improvement professional development program introduces teachers to infusing computers into the curriculum and classroom activities seamlessly. This work covers a successful computer-related professional development program that was implemented into Kindergarten through eighth grade classrooms of a Philadelphia school.
Discusses the influence of information technology on multimedia intellectual property protection and its proper solutions from institutional, technical, and legal perspectives.
Presents instructional approaches for archaeological e-learning based on networked technologies. This book provides a global perspective on the resources, development, application, and implications of information communication technology in multimedia-based educational products and services in archaeology.
Explores the technical, pedagogical, methodological, tutorial, legal, and emotional aspects of e-learning, considering and analyzing its different application contexts. This book provides researchers and practitioners with a view of e-learning as a lifelong learning tool for scholars in both academic and professional spheres.
Explores various dimensions of online teaching, including class preparation, process effectiveness and quality, and technology utilization.
Explores the role of information seeking and retrieval in the development of information systems to support personalized and autonomous learning.
The way that citation frequency was counted and analyzed changed from the early manual transcribing and statistical computation of citation data to computer-based citation data creation and its manipulation. This book introduces an alternative approach to conducting author cocitation analysis (ACA) without relying on commercial citation databases.
Designed to strengthen understanding of the critical information in the framework for technology application competencies for K-12 teachers.
Presents languages and notation systems of ID and the integration of these technologies in education.
Explores the foundation, history, and theory of intelligent adaptive systems, providing scholars, researchers, and practitioners with a fundamental resource on topics such as the emergence of intelligent adaptive systems in social sciences, biologically inspired artificial social systems, and sensory information processing.
Covers the theoretical, thematic, and country-specific issues of knowledge cities to underline the importance of knowledge-based urban development. This book provides academics, researchers, and practitioners with research on the decisive lineaments of urban development for knowledge-based production.
Intrusion detection and protection is a key component in the framework of the computer and network security area. This book addresses the needs for intrusion detection and protection. It covers topics such as network traffic data, anomaly intrusion detection, and prediction events.
Discusses the various ways a specific application can be modeled and solved using advanced problem solving techniques.
Software engineering environments help reduce the design costs of very large and intricate software systems while improving the quality of the software produced. This work addresses the complex issues associated with software engineering environment capabilities for designing real-time embedded software systems.
Discusses the emergent usability theories, techniques, tools, and best practices in mobile, ubiquitous, and virtual environments.
Addresses issues of advancing health information systems and informatics as innovative forms of investment in healthcare.
The analysis of commonalities and differences between agile technology and open source software development is needed to understand how advancement approaches have evolved and whether they produce concrete benefits in terms of software quality and customer satisfaction. This title explores the overlap between open source and agile technologies.
Examines various technical and organizational elements that impact services management, business management, risk management, and customer relationship management.
Examines information security management for the facilitation of picture archiving and communication systems.
Presents an overview on the main issues of data mining, including its classification, regression, clustering, and ethical issues.
Investigates the notion that ICTs have the potential to improve the lives of people and contribute to social development in developing countries.
Explores research on new technologies for the virtual enterprise operation that has opened up new ideas on the design principles and operation approaches in order to maximize benefits and overcome limitations encountered.
Addresses solutions for and research on data mining, with particular emphasis on potential real-world applications.
Investigates the security-related specifications that encompass message level security, transactions, and identity management.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.