Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (8)
  • EUV Frankfurt  (4)
  • SB Rathenow
  • Inst. f. Musikforschung
  • Filmuniversität Babelsberg
  • Computer Science  (12)
Type of Medium
Language
Region
Library
Access
  • 1
    Book
    Book
    New York :New York University Press,
    UID:
    almahu_BV044748837
    Format: xv, 229 Seiten : , Illustrationen ; , 23 cm.
    ISBN: 978-1-4798-4994-9 , 978-1-4798-3724-3
    Content: In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities. Data discrimination is a real social problem; Noble argues that the combination of private interests in promoting certain sites, along with the monopoly status of a relatively small number of Internet search engines, leads to a biased set of search algorithms that privilege whiteness and discriminate against people of color, specifically women of color. Through an analysis of textual and media searches as well as extensive research on paid online advertising, Noble exposes a culture of racism and sexism in the way discoverability is created online. As search engines and their related companies grow in importance—operating as a source for email, a major vehicle for primary and secondary school learning, and beyond—understanding and reversing these disquieting trends and discriminatory practices is of utmost importance. An original, surprising and, at times, disturbing account of bias on the internet, Algorithms of Oppression contributes to our understanding of how racism is created, maintained, and disseminated in the 21st century. Quelle/Source: Klappentext
    Note: Dissertation California State University
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-4798-6676-2
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-4798-3364-1
    Language: English
    Subjects: Computer Science , Ethnology , General works , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Suchmaschine ; Algorithmus ; Diskriminierung ; Rassismus ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift
    Author information: Noble, Safiya Umoja.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947364520402882
    Format: XII, 523 p. 137 illus., 60 illus. in color. , online resource.
    ISBN: 9783642245411
    Series Statement: Lecture Notes in Computer Science, 6875
    Content: This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell’s work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell’s love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.
    Note: Part A: Biographical -- What I Learned from Brian (Hermann Kopetz) -- Brian Randell: A Biographical Note (John L. Lloyd and Tom Anderson) -- Part B: Conference Papers -- On Building a Referee’s Avatar (Algirdas Avizienis) -- From Theory to Practice: The Invention of Programming, 1947-51 (Martin Campbell-Kelly) -- Transactions: From Local Atomicity to Atomicity in the Cloud (David Lomet) -- From DSS to MILS (John Rushby) -- Pre-electronic Computing (Doron Swade) -- Whetstone Wanderings (Brian Wichmann) -- Part C: Contributed Papers -- Using Real-Time Road Traffic Data to Evaluate Congestion (Jean Bacon, Andrei Iu. Bejan, Alastair R. Beresford, David Evans, Richard J. Gibbens, and Ken Moody) -- Fault Tolerant Autonomic Computing Systems in a Chemical Setting (Jean-Pierre Banatre, Christine Morin, and Thierry Priol) -- Out of a Closet: The Early Years of the Computer Museum (Gordon Bell) -- Timing Faults and Mixed Criticality Systems (Alan Burns and Sanjoy Baruah) -- Professor Brian Randell and the History of Computing (Paul E. Ceruzzi) -- Computer Storage Fragmentation: Pioneering Work of Brian Randell (Ed Coffman) -- IBM-ACS: Reminiscences and Lessons Learned from a 1960’s Supercomputer Project (Lynn Conway) -- The Belgian Electronic Mathematical Machine (1951-1962): An Account (Pierre-Jacques Courtois) -- On the Resilience of the Dependability Framework to the Intrusion of New Security Threats (Marc Dacier) -- Virtual Fault Tolerance (Peter J. Denning) -- Recovery Blocks (Tony Hoare) -- The Development and Writing of “Process Structuring” (J.J. Horning) -- A Tolerant Approach to Faults (Michael Jackson) -- Causality in Structured Occurrence Nets (Jetty Kleijn and Maciej Koutny) -- Diversity (John C. Knight) -- Swords and Ploughshares: Connections between Computer Projects for War and Peace, 1945–55 (Simon Lavington) -- The Evolution of the Arjuna Transaction Processing System (M.C. Little and S.K. Shrivastava) -- Making Experiments Dependable (Roy Maxion) -- Wallpaper Maps (M. Douglas McIlroy) -- Incremental Design: Programming with Holes and Evolvers (Ron Morrison, Dharini Balasubramaniam, and Brian Warboys) -- Carrying Goals to Newcastle: A Tribute to Brian Randell (Peter G. Neumann) -- Distributed Computing in the 21st Century: Some Aspects of Cloud Computing (Fabio Panzieri, Ozalp Babaoglu, Stefano Ferretti, Vittorio Ghini, and Moreno Marzolla) -- Software Engineering: Multi-person Development of Multi-version Programs (David Lorge Parnas) -- Tolerance of Design Faults (David Powell, Jean Arlat, Yves Deswarte, and Karama Kanoun) -- On the Implementation of Concurrent Objects (Michel Raynal) -- Beyond Traces and Independence (Fred B. Schneider) -- Socio-technical Complex Systems of Systems: Can We Justifiably Trust Their Resilience? (Luca Simoncini) -- Safety, Security and Dependability in Crowd Computing (W_ladys_law M. Turski) -- Achieving Dependability in Service-Oriented Systems (Jie Xu).
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642245404
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Festschrift ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1647284988
    Format: 1 Online-Ressource (xix, 264 Seiten) , Diagramme
    Edition: Second Edition
    ISBN: 9780387271088
    Series Statement: Health informatics
    Content: Through the use of case studies, this volume addresses the complex challenges involved in implementing technological change in healthcare organizations
    Note: Description based upon print version of record , Introduction; GEMINI: The Life and Times of a Clinical Information System; Introduction; The Web Center: A Case Study in Strategy and Power; Computers for Kids: Not All Fun and Games; Managing Change; Managing Success: An Information Systems Dilemma at Great Plains Health Care; Introduction; Bar Coding: It's Hard to Kill a Hippo; Developing an Emergency Department Information System; Implementation of OpChart in West Medical Building; Development of the Scientific Computing Center at Vanderbilt University , Early Implementation Problems of an Integrated Information System Within the White Mountain University Health SystemImplementation of a Web-Based Incident-Reporting System at Legendary Health System; Managing Change: Analysis of a Hypothetical Case; Introduction; E3 at Vanderbilt University Medical Center; Catch 22: The Case of Utilization Management's Return on Investment Evaluation; Antimicrobial Utilization Program at the University of Central State Medical Center; Central Medical Healthcare System: The Case of the Well-Aggregated Patient Data , Building Consensus: Quality Improvement at Vesalius Health SystemIntroduction; Strategic Informatics: Planning for the Future of AtlanticHealth; Fix Pharmacy!; Showdown in the Heart of Texas; Mission Valley Medical Center Physicians Group Practice: The Rumor; The DNA Donation Project; Who's in Charge?; Introduction; The Chief Resident's Dilemma; Death of a Committee; Whose Job Is It Anyway?; All for the Want of a Plan …; Fail to Plan, Plan to Fail; Founding Fathers Health Corporation: Idealism and the Bottom Line;
    Additional Edition: ISBN 038721447X
    Additional Edition: ISBN 9780387214474
    Additional Edition: Erscheint auch als Druck-Ausgabe Transforming health care through information New York, NY : Springer, 2005 ISBN 038721447X
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Gesundheitsinformationssystem ; Gesundheitsinformationssystem ; Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_BV045422584
    Format: X, 691 Seiten : , Porträt [der Autorin].
    Edition: First edition
    ISBN: 978-1-61039-569-4 , 1-61039-569-7
    Content: "Shoshana Zuboff, named "the true prophet of the information age" by the Financial Times, has always been ahead of her time. Her seminal book In the Age of the Smart Machine foresaw the consequences of a then-unfolding era of computer technology. Now, three decades later she asks why the once-celebrated miracle of digital is turning into a nightmare. Zuboff tackles the social, political, business, personal, and technological meaning of "surveillance capitalism" as an unprecedented new market form. It is not simply about tracking us and selling ads, it is the business model for an ominous new marketplace that aims at nothing less than predicting and modifying our everyday behavior...where we go, what we do, what we say, how we feel, who we're with. The consequences of surveillance capitalism for us as individuals and as a society vividly come to life in The Age of Surveillance Capitalism's pathbreaking analysis of power. The threat has shifted from a totalitarian "big brother" state to a universal global architecture of automatic sensors and smart capabilities: A "big other" that imposes a fundamentally new form of power and unprecedented concentrations of knowledge in private companies...free from democratic oversight and control"...
    Note: Includes bibliographical references and index
    Additional Edition: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-593-43943-3
    Additional Edition: Erscheint auch als Online-Ausgabe, ePub ISBN 978-3-593-43963-1
    Additional Edition: Erscheint auch als Online-Ausgabe Zuboff, Shoshana, 1951- author Age of surveillance capitalism New York : PublicAffairs, 2018 ISBN 9781610395700
    Language: English
    Subjects: Computer Science , Economics , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Personenbezogene Daten ; Kommerzialisierung ; Big Data ; Datenanalyse ; Datenmissbrauch ; Multinationales Unternehmen ; Digitalisierung ; Profit ; Kapitalismus ; Überwachung
    Author information: Zuboff, Shoshana, 1951-,
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    New York :New York University Press,
    UID:
    almafu_BV046761456
    Format: 1 Online-Ressource (xv, 229 Seiten) : , Illustrationen.
    ISBN: 978-1-4798-3364-1
    Content: A revealing look at how negative biases against women of color are embedded in search engine results and algorithms Run a Google search for “black girls”—what will you find? “Big Booty” and other sexually explicit terms are likely to come up as top search terms. But, if you type in “white girls,” the results are radically different. The suggested porn sites and un-moderated discussions about “why black women are so sassy” or “why black women are so angry” presents a disturbing portrait of black womanhood in modern society.In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities. Data discrimination is a real social problem; Noble argues that the combination of private interests in promoting certain sites, along with the monopoly status of a relatively small number of Internet search engines, leads to a biased set of search algorithms that privilege whiteness and discriminate against people of color, specifically women of color.Through an analysis of textual and media searches as well as extensive research on paid online advertising, Noble exposes a culture of racism and sexism in the way discoverability is created online. As search engines and their related companies grow in importance—operating as a source for email, a major vehicle for primary and secondary school learning, and beyond—understanding and reversing these disquieting trends and discriminatory practices is of utmost importance.An original, surprising and, at times, disturbing account of bias on the internet, Algorithms of Oppression contributes to our understanding of how racism is created, maintained, and disseminated in the 21st century
    Note: Dissertation California State University
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-4798-4994-9
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-1-4798-3724-3
    Language: English
    Subjects: Computer Science , Ethnology , General works , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Suchmaschine ; Algorithmus ; Diskriminierung ; Rassismus ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Noble, Safiya Umoja
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947364203002882
    Format: XIV, 247 p. , online resource.
    ISBN: 9783540732303
    Series Statement: Lecture Notes in Computer Science, 4498
    Content: Reliable Software Technologies is an annual series of international conferences devoted to the promotion and advancement of all aspects of reliable software technologies. The objective of this series of conferences, initiated and sponsored by Ada-Europe, the European federation of national Ada societies, is to provide a forum to promote the development of reliable softwares both as an industrial technique and an academic discipline. Previous editions of the Reliable Software Technologies conference were held in: Porto (Portugal) in 2006, York (UK) in 2005, Palma de Mallorca (Spain) in 2004,Toulouse (France) in 2003,Vienna (Austria) in 2002,Leuven (Belgium) in 2001,Potsdam(Germany)in2000,Santander(Spain)in1999,Uppsala(Sweden) in 1998, London (UK) in 1997 and Montreux (Switzerland) in 1996. The 12th International Conference on Reliable Software Technologies took place in Geneva, Switzerland, June 25-29, 2007, under the continued sponsoring ofAda-Europe,incooperationwithACMSIGAda.Itwasorganizedbymembers of the University of Applied Sciences, Western Switzerland (Engineering School of Geneva), in collaboration with colleagues from various places in Europe. The 13th conference, in 2008, will take place in Venice, Italy.
    Note: Real-Time Utilities for Ada 2005 -- Handling Temporal Faults in Ada 2005 -- Implementation of New Ada 2005 Real-Time Services in MaRTE OS and GNAT -- Enhancing Dependability of Component-Based Systems -- On Detecting Double Literal Faults in Boolean Expressions -- Static Detection of Livelocks in Ada Multitasking Programs -- Towards the Testing of Power-Aware Software Applications for Wireless Sensor Networks -- An Intermediate Representation Approach to Reducing Test Suites for Retargeted Compilers -- Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach -- A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis -- ArchMDE Approach for the Development of Embedded Real Time Systems -- Generating Distributed High Integrity Applications from Their Architectural Description -- Automatic Ada Code Generation Using a Model-Driven Engineering Approach -- Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar -- Modelling Remote Concurrency with Ada -- Design and Performance of a Generic Consensus Component for Critical Distributed Applications -- Sancta: An Ada 2005 General-Purpose Architecture for Mobile Robotics Research -- Incorporating Precise Garbage Collection in an Ada Compiler.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540732297
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1625843186
    Format: xi, 338 Seiten , Illustrationen, Diagramme, Karten , 22 cm
    Edition: First edition
    ISBN: 9780062390868 , 9780062390851
    Content: How much sex are people really having? How many Americans are actually racist? Is America experiencing a hidden back-alley abortion crisis? Can you game the stock market? Does violent entertainment increase the rate of violent crime? Do parents treat sons differently from daughters? How many people actually read the books they buy? In this work, Seth Stephens-Davidowitz, a Harvard-trained economist, former Google data scientist, and New York Times writer, argues that much of what we thought about people has been dead wrong. The reason? People lie, to friends, lovers, doctors, surveys -- and themselves. However, we no longer need to rely on what people tell us. New data from the internet -- the traces of information that billions of people leave on Google, social media, dating, and even pornography sites -- finally reveals the truth. By analyzing this digital goldmine, we can now learn what people really think, what they really want, and what they really do. Sometimes the new data will make you laugh out loud. Sometimes the new data will shock you. Sometimes the new data will deeply disturb you. But, always, this new data will make you think.--
    Language: English
    Subjects: Computer Science , General works , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Big Data ; Psychologie ; Internet ; Big Data ; Datenanalyse ; Verhaltensmuster ; Data Mining ; Falschaussage ; Big Data ; Psychologie ; Internet ; Data Mining ; Big Data ; Psychologie ; Internet ; Data Mining
    Author information: Pinker, Steven 1954-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Berlin : Springer
    UID:
    gbv_1652326715
    Format: Online-Ressource (XII, 263 S. 100 Abb. in Farbe, digital)
    ISBN: 9783642154539
    Series Statement: X.media.press
    Content: Einleitung -- I. Bausteine zu einer Theorie interaktiver Infografiken -- Definition, Grundbegriffe, Einordnung -- Typologie -- Dramaturgische Muster -- Interaktive Karten und Geovisualisierungen -- Infografik und Comic -- Infografiken aus mediendidaktischer Sicht -- II. Rezeption und Wirkungsanalyse -- Evaluation interaktiver Visualisierungen -- Navigation, Interaktion, Multimedialität. Rezeptions- und Nutzungsprobleme bei interaktiven Infografiken -- III. Prozesse, Praktiken, Haltungen -- Das Diagramm ist tot, es lebe das Diagramm -- Im Vordergrund steht immer die Information. Erfahrungen eines Infografikers -- "Das würde ich anders machen". - Produktionspraktiken interaktiver Infografiken -- "We are journalists". Ein Interview mit der New York Times -- Best Practice -- IV. Interkulturelle Aspekte.
    Content: Infografik, interaktiv - allein diese beiden Begriffe füllen Bücher! Interaktive Infografik: Zu dieser Kombination wurde bis jetzt wenig publiziert. Diese Lücke will der vorliegende Band schließen. Er führt ein in Theorie, Design und Rezeption von interaktiven Infografiken. Die Autorinnen und Autoren betrachten die interaktive Infografik aus theoretischer und praktischer Perspektive: Sie erforschen die interaktive Infografik als Diagramm, als Karte, als Comic, als hybride Form, beschreiben Typen und Muster und vergleichen westliche mit fernöstlichen Designvarianten. Sie stellen die interaktive Infografik in den Kontext von Lernen und Wissenserwerb, diskutieren Evaluationsmethoden, analysieren Rezeptions- und Nutzungsprobleme und leiten daraus Gestaltungsempfehlungen ab. Fallbeispiele und Expertentipps ergänzen die Beiträge und erhöhen den praktischen Nutzen des Werks.
    Note: Includes bibliographical references , Vorwort; Danksagung; Inhaltsverzeichnis; Teil I Theoretische Grundlagen; 1 Interaktive Infografiken: Standortbestimmung und Definition; 1.1 Forschungskontext; 1.2 Begriffskontext; 1.3 Bild - Sprache - Zahl; 1.4 Interaktiv - Statisch - Animiert; 1.5 Linear - Nonlinear; 1.6 Multimedial - Multimodal; 1.7 Deskriptiv - Explikativ - Narrativ; 1.8 Definition: Interaktive Infografik; Literatur; 2 Typen, Muster und hybride Formen. Ein Typologisierungsmodell für interaktive Infografiken; 2.1 Einleitung; 2.2 Was andere schon erforscht haben; 2.3 Qualitative Inhaltsanalyse , 2.4 Dramaturgiemuster und ihre Mustervarianten2.5 Fazit; 2.6 Untersuchungskorpus; Literatur; 3 Interaktive Karten und Geovisualisierungen; 3.1 Einführung. Von der gedruckten Karte zur interaktiven Geovisualisierung; 3.2 Theoretische und methodische Grundlagen der Kartografie und Geovisualisierung; 3.3 Wichtige Entwicklungstendenzen für interaktive Karten und Geovisualisierungen als Informationsgrafiken; 3.4 Formen der Interaktion mit Karten und Geovisualisierungen; 3.5 Anwendungsbeispiele; Literatur; 4 Wahrnehmungsprozesse bei interaktiven Infografiken - Theorien und Modelle; 4.1 Einleitung , 4.2 Was bedeutet „Behalten" und „Verstehen" von Informationen?4.3 Lernen und Multimedia; 4.4 Modelle und Theorien zum Lernen mit Neuen Medien; 4.5 Fazit; Literatur; Teil II Evaluation und empirische Analysen; 5 Ansätze zur Evaluation interaktiver Infografiken; 5.1 Qualitätssicherung und Qualitätskontrolle durch Evaluation; 5.2 Konzepte zur Qualität interaktiver Infografiken: Wissenserwerb, Usability und User Experience; 5.3 Verortung der Evaluation im Produktionsprozess; 5.4 Evaluation der Rezeptions- und Nutzungsqualität; 5.5 Formative Evaluation der User Experience , 5.6 Evaluation des Wissenserwerbs5.7 Ausblick; Literatur; 6 Navigation - Interaktion - Informationspräsentation. Rezeptions- und Nutzungsprobleme bei interaktiven Infografiken; 6.1 Untersuchung zu Rezeption und Nutzung von Infografiken; 6.2 Inhalte darstellen; 6.3 Präsentation von Informationen; 6.4 Text in Infografiken; 6.5 Interaktion; 6.6 Steuerung dynamischer Medien; 6.7 Schluss; Literatur; Teil III Fallbeispiele und praktische Anwendungen; 7 Das Diagramm ist tot, es lebe das Diagramm; 7.1 Einleitung; 7.2 Proportionalitätsgebot; 7.3 Vergleichsgebot; 7.4 Konformitätsgebot; 7.5 Schluss , Literatur8 Im Vordergrund steht immer die Information. Erfahrungen eines Infografikers; 8.1 Einleitung; 8.2 Was bedeutet das für Infografiker?; 8.3 Die interaktive Grafik; 8.4 Das Erklärziel; 8.5 Ein Fallbeispiel, gedruckt und interaktiv: Der Tod von Lady Diana; 8.6 Fazit; Weiterführende Literatur; 9 ``We Are Journalists.'' Production Practices, Attitudes and a Case Study of the New York Times Newsroom; 9.1 Introduction; 9.2 Design of the Study; 9.3 Results; 9.4 The New York Times - A Case Study; 9.5 Conclusions; References; Teil IV Perspektivenwechsel , 10 Comics and Interactive Information Graphics , Einleitung -- I. Bausteine zu einer Theorie interaktiver Infografiken -- Definition, Grundbegriffe, Einordnung -- Typologie -- Dramaturgische Muster -- Interaktive Karten und Geovisualisierungen -- Infografik und Comic -- Infografiken aus mediendidaktischer Sicht -- II. Rezeption und Wirkungsanalyse -- Evaluation interaktiver Visualisierungen -- Navigation, Interaktion, Multimedialität. Rezeptions- und Nutzungsprobleme bei interaktiven Infografiken -- III. Prozesse, Praktiken, Haltungen -- Das Diagramm ist tot, es lebe das Diagramm -- Im Vordergrund steht immer die Information. Erfahrungen eines Infografikers -- "Das würde ich anders machen". - Produktionspraktiken interaktiver Infografiken -- "We are journalists". Ein Interview mit der New York Times -- Best Practice -- IV. Interkulturelle Aspekte.
    Additional Edition: ISBN 9783642154522
    Additional Edition: Erscheint auch als Druck-Ausgabe Interaktive Infografiken Berlin : Springer Vieweg, 2013 ISBN 9783642154522
    Language: German
    Subjects: Computer Science , General works
    RVK:
    RVK:
    RVK:
    Keywords: Informationsgrafik ; Computeranimation ; Visualisierung ; Informationsgrafik ; Computeranimation ; Visualisierung
    URL: Volltext  (lizenzpflichtig)
    Author information: Weber, Wibke 1965-
    Author information: Burmester, Michael 1961-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_1646675924
    Format: Online-Ressource
    ISBN: 9783540338529 , 3540338519 , 9783540338512
    Series Statement: Lecture Notes in Computer Science 3958
    Content: Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents -- An Attack on a Modified Niederreiter Encryption Scheme -- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared-Coefficients Setting -- Generic On-Line/Off-Line Threshold Signatures -- Linear Integer Secret Sharing and Distributed Exponentiation -- Encryption Methods -- Encoding-Free ElGamal Encryption Without Random Oracles -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption -- Number Theory Algorithms -- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve -- Efficient Scalar Multiplication by Isogeny Decompositions -- Curve25519: New Diffie-Hellman Speed Records -- Pairing-Based Cryptography -- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman -- Generalization of the Selective-ID Security Model for HIBE Protocols -- Identity-Based Aggregate Signatures -- On the Limitations of the Spread of an IBE-to-PKE Transformation -- Cryptosystems Design and Analysis -- Inoculating Multivariate Schemes Against Differential Attacks -- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting Protection -- Signature and Identification -- New Online/Offline Signature Schemes Without Random Oracles -- Anonymous Signature Schemes -- The Power of Identification Schemes -- Authentication and Key Establishment -- Security Analysis of KEA Authenticated Key Exchange Protocol -- SAS-Based Authenticated Key Agreement -- The Twist-AUgmented Technique for Key Exchange -- Password-Based Group Key Exchange in a Constant Number of Rounds -- Multi-party Computation -- Conditional Oblivious Cast -- Efficiency Tradeoffs for Malicious Two-Party Computation -- PKI Techniques -- On Constructing Certificateless Cryptosystems from Identity Based Encryption -- Building Better Signcryption Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous Authentication with a Constant Proving Cost.
    Content: The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of Cr- tologic Research (IACR), and this year it was also sponsored by the Columbia University Computer Science Department as well as a number of sponsors from industry, among them: EADS and Morgan Stanley, which were golden sponsors, as well as Gemplus, NTT DoCoMo, Google, Microsoft and RSA Security, which were silver sponsors. We acknowledge the generous support of our industrial sponsors; their support was a major contributing factor to the success of this year’s PKC. PKC 2006 followed a series of very successful conferences that started in 1998in Yokohama,Japan.Further meetingswereheld successivelyinKamakura (Japan), Melbourne (Australia), Jeju Island (Korea), Paris (France), Miami (USA), Singapore and Les Diablerets (Switzerland). The conference became an IACR sponsored event (o?cially designated as an IACR workshop) in 2003 and has been sponsored by IACR continuously since then. The year 2006 found us all in New York City where the undertone of the conference was hummed in the relentless rhythm of the city that never sleeps.
    Additional Edition: ISBN 9783540338512
    Additional Edition: Buchausg. u.d.T. PKC (9 : 2006 : New York, NY) Public key cryptography - PKC 2006 Berlin : Springer, 2006 ISBN 3540338519
    Additional Edition: ISBN 9783540338512
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Public-Key-Kryptosystem ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book
    Book
    London : Oneworld
    UID:
    b3kat_BV043774027
    Format: XI, 239 Seiten , 20 cm
    ISBN: 9781780748368
    Content: Coal, iron ore and oil were the fuel of the Industrial Revolution. Today's economies and governments are powered by something far less tangible: the explosive abundance of digital data. Steve Lohr, the New York Times' chief technology reporter, charts the ascent of Data-ism, the dominating philosophy of the day in which data is at the forefront of everything and decisions of all kinds are based on data analysis rather than experience and intuition. Taking us behind the scenes and introducing the DOPs (Data Oriented-People), the key personalities behind this revolution, he reveals how consuming the bits and bytes of the masses is transforming the nature of business and governance in unforeseen ways. But what are losing in the process and what new dangers await?
    Note: First published: 2015 , Includes bibliographical references and index
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-78074-519-0
    Language: English
    Subjects: Computer Science
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages