Advances in computers. Volume 70 / edited by Marvin V. Zelkowitz.
The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpin...
Saved in:
Online Access: |
Full Text (via ScienceDirect) |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Amsterdam :
Academic Press,
2007.
|
Series: | Advances in computers,
|
Subjects: |
Table of Contents:
- Cover; Copyright page; Contents; Contributors; Preface; Chapter 1. Designing Networked Handheld Devices to Enhance School Learning; 1. Introduction; 2. Historical Large Scale Successes; 3. Technology Context for Learning Applications; 4. Overarching Ideas from the Learning Sciences; 5. Design of Instructional Technologies; 6. Looking Forward; 7. Conclusion; Acknowledgements; References; Chapter 2. Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering; 1. Introduction; 2. Related Work.
- 3. A Model for Interactive Web-driven and Dialogue-based Search4. Analysis and Results; 5. Conclusions; Acknowledgements; References; Chapter 3. A Tour of Language Customization Concepts; 1. Introduction; 2. Languages, Abstraction and Domain-Specificity; 3. Derivation Types; 4. Lightweight Language Customization; 5. Customization Support Environments; 6. Ontological Metalevels; 7. Orthogonal Classification Architecture; 8. Languages versus Libraries; 9. Transformations; 10. Conclusion; References; Chapter 4. Advances in Business Transformation Technologies; 1. Introduction.
- 2. Value-Oriented, Model-Driven Business Transformation3. Model-Driven Ontology Engineering; 4. Business Process Composition with Web Services; Acknowledgements; Appendix A: Acronyms; References; Chapter 5. Phish Phactors: Offensive and Defensive Strategies; 1. Introduction; 2. Core Phishing Techniques; 3. Advanced Phishing Techniques; 4. Anti-Phishing Techniques; 5. Comprehensive Anti-Phishing Efforts; 6. Conclusion; Acknowledgements; References; Chapter 6. Reflections on System Trustworthiness; 1. A Total-System Perspective; 2. Anticipating Disasters; 3. Trustworthiness.
- 4. Risks in Trusting Untrustworthiness5. Principles for Developing Trustworthy Systems; 6. System Composition: Problems and Potentials; 7. A Crisis in Information System Security; 8. Optimistic Optimization; 9. An Example: Risks in Electronic Voting Systems; 10. The Need for Risk Awareness; 11. Risks of Misinformation; 12. Boon or Bane?; Acknowledgements; References; Author Index; Subject Index; Contents of Volumes in this Series.