| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910136972003321 |
|
|
Titolo |
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) : 10-14 August 2015, Beijing, China / / Institute of Electrical and Electronics Engineers |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Piscataway, New Jersey : , : IEEE, , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (1868 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Artificial intelligence |
Autonomic computing |
Computer networks - Scalability |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
The 5 IEEE co located conferences are aimed at discuss the hottest topics in Smart Worlds with Intelligence, Service, Connection, Cloud and Big Data to achieve the convergence of the four worlds, i e, Physical World, Cyber World, Social World, and Thinking World These conferences will provide a high profile, leading edge forum for researchers, engineers and practitioners to present state of art advances and innovations in theoretical foundations, systems, infrastructure, tools, testbeds, and applications. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996464508503316 |
|
|
Autore |
Li Hui (Computer scientist) |
|
|
Titolo |
Co-governed Sovereignty Network [[electronic resource] ] : Legal Basis and Its Prototype & Applications with MIN Architecture / / by Hui Li, Xin Yang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (284 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
YangXin (Computer scientist) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Computer networks—Security measures |
Blockchains (Databases) |
Computer Communication Networks |
Mobile and Network Security |
Blockchain |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Chapter 1 Sovereignty and Network Sovereignty -- Chapter 2 Interpretation of Network Sovereignty.-Chapter 3 Architecture of Sovereignty Network -- Chapter 4 Key Technologies of Sovereignty Network -- Chapter 5 Prototype of Sovereignty Network and Application of Private Network based on MIN. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN |
|
|
|
|
|
|
|
|
|
|
|
|
|
network implements the “four principles” of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network. |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910958836203321 |
|
|
Autore |
Mills Julie |
|
|
Titolo |
Gender inclusive engineering education / / Julie Mills, Mary Ayre, and Judith Gill |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Routledge, 2010 |
|
New York : , : Routledge, , 2010 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-136-97310-9 |
1-136-97311-7 |
1-282-56962-7 |
9786612569623 |
0-203-85195-1 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (229 p.) |
|
|
|
|
|
|
Collana |
|
Routledge research in education |
|
|
|
|
|
|
Altri autori (Persone) |
|
AyreMary |
GillJudith <1942-> |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Women engineers - Education |
Educational equalization |
Engineering - Study and teaching (Higher) |
Sex differences in education |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Book Cover; Title; Copyright; Contents; Tables; Foreword by Emeritus Professor Robin King; Acknowledgments; 1 Introduction: Why We Need Gender Inclusive Engineering Education; 2 Women in Engineering: The |
|
|
|
|
|
|
|
|
|
|
|
Current Position; 3 Attracting Women to Enter and Succeed in Engineering Study; 4 Learning, Curriculum and Gender: Theoretical Contexts; 5 Design and Implementation Strategies for Gender Inclusive Engineering Curriculum; 6 Gender Inclusive Engineering Courses; 7 Implementing and Embedding Gender Inclusive Engineering Education; 8 In Conclusion: A Look to the Future |
Appendix A: ACCREDITATION CRITERIA AND ATTRIBUTES OF ENGINEERING GRADUATESAppendix B: GLOSSARY OF TERMS; Bibliography; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Women continue to comprise a small minority of students in engineering education and subsequent employment, despite the numerous initiatives over the past 25 years to attract and retain more women in engineering. This book demonstrates the ways in which traditional engineering education has not attracted, supported or retained female students and identifies the issues needing to be addressed in changing engineering education to become more gender inclusive. This innovative and much-needed work also addresses how faculty can incorporate inclusive curriculum within their courses and programs, an |
|
|
|
|
|
|
|
| |