Proceedings of the Technology and the Mine Problem Symposium
Author: Albert M. Bottoms
Publisher:
Published: 1996
Total Pages: 756
ISBN-13:
DOWNLOAD EBOOKRead and Download eBook Full
Author: Albert M. Bottoms
Publisher:
Published: 1996
Total Pages: 756
ISBN-13:
DOWNLOAD EBOOKAuthor: Jan Maarten Schraagen
Publisher: Ashgate Publishing, Ltd.
Published: 2008
Total Pages: 446
ISBN-13: 9780754670209
DOWNLOAD EBOOKThis book presents the latest work in the area of naturalistic decision making (NDM) and its extension into the area of macrocognition. It contains 18 chapters relating research centred on the study of expertise in naturalistic settings, written by international experts in NDM and cognitive systems engineering. The objective of the book is to present the reader with exciting new developments in this field of research, which is characterized by its application-oriented focus.The work addresses only real-world problems and issues. For instance, how do multi-national teams collaborate effectively? How can surgeons best be supported by technology? The traditional field of NDM is extended in this work by focusing on macrocognitive functions other than decision making, namely sense-making, coordination and planning. This has broadened the scope of the field. The book also contains a theoretical discussion of the macro-micro distinction. Naturalistic Decision Making and Macrocognition will be relevant to graduate students, researchers and professionals (including professionals and researchers in business, industry and government) who are interested in decision making, expertise, training methods and system design.
Author: James J. Staszewski
Publisher: Psychology Press
Published: 2013-05-29
Total Pages: 413
ISBN-13: 113510879X
DOWNLOAD EBOOKThe research on human expertise and complex skill acquisition that Wlliam G. Chase performed in the decade between publication of the classic chess studies he conducted with Herb Simon in 1973 and his untimely and tragic death has proven profoundly influential and enduring. Its impact spans disciplines that include Psychology, Computer Science, Education, Cognitive Neuroscience, Medicine, and Human Factors. It has contributed significantly to the emergence of Cognitive Engineering and has led to significant applications in the areas of training and instruction and knowledge-based "intelligent" computational systems. Its influence can be seen in current discussions of intelligence, heritability, intellectual potential, and achievement found in the contemporary popular press. The chapters in this volume document the enduring scientific contributions of William G. Chase to current knowledge and understanding of human expertise and skill acquisition and applications his work has supported. It will be of interest to those researching, studying, and working in the multiple fields that were greatly influenced by Chase's work.
Author: United States. Congress. House. Committee on Armed Services. Subcommittee on Military Research and Development
Publisher:
Published: 2003
Total Pages: 492
ISBN-13:
DOWNLOAD EBOOKAuthor: Sushil Jajodia
Publisher: Springer
Published: 2008-07-17
Total Pages: 702
ISBN-13: 038709699X
DOWNLOAD EBOOKThese proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8–10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty,and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion.
Author: Vargas Martin, Miguel
Publisher: IGI Global
Published: 2010-10-31
Total Pages: 354
ISBN-13: 1609600967
DOWNLOAD EBOOKTechnology has been used to perpetrate crimes against humans, animals, and the environment, which include racism, cyber-bulling, illegal pornography, torture, illegal trade of exotic species, irresponsible waste disposal, and other harmful aberrations of human behavior. Technology for Facilitating Humanity and Combating Social Deviations: Interdisciplinary Perspectives provides a state-of-the-art compendium of research and development on socio-technical approaches to support the prevention, mitigation, and elimination of social deviations with the help of computer science and technology. This book provides historical backgrounds, experimental studies, and future perspectives on the use of computing tools to prevent and deal with physical, psychological and social problems that impact society as a whole.
Author: Yingjiu Li
Publisher: Springer Science & Business Media
Published: 2011-06-30
Total Pages: 319
ISBN-13: 3642223478
DOWNLOAD EBOOKThis book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
Author: V. R. Shea-Albin
Publisher:
Published: 1993
Total Pages: 44
ISBN-13:
DOWNLOAD EBOOKAuthor: Somesh Jha
Publisher: Springer Science & Business Media
Published: 2010-12-02
Total Pages: 272
ISBN-13: 3642177131
DOWNLOAD EBOOKThis book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security.
Author: Lingyu Wang
Publisher: Springer
Published: 2013-07-10
Total Pages: 316
ISBN-13: 3642392563
DOWNLOAD EBOOKThis book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.