05261nam 2200637 a 450 991045185310332120200520144314.01-280-66900-497866136459371-84816-749-0(CKB)2550000000101741(EBL)919147(OCoLC)794328432(SSID)ssj0000659113(PQKBManifestationID)12272006(PQKBTitleCode)TC0000659113(PQKBWorkID)10694775(PQKB)11419360(MiAaPQ)EBC919147(WSP)0000P790(Au-PeEL)EBL919147(CaPaEBR)ebr10563555(CaONFJC)MIL364593(EXLCZ)99255000000010174120120607d2012 uy 0engur|n|---|||||txtccrThis pervasive day[electronic resource] the potential and perils of pervasive computing /edited by Jeremy PittLondon Imperial College Press20121 online resource (314 p.)Description based upon print version of record.1-84816-748-2 Includes bibliographical references and index.Preface; Acknowledgements; Contents; 1. Introduction: This Pervasive Day Jeremy Pitt; 1.1 Levin's Legacy; 1.2 This Perfect Day; 1.3 UniComp, Revisited; 1.3.1 Construction; 1.3.2 Interaction; 1.3.3 Functionality; 1.3.4 Infrastructure; 1.4 This Pervasive Day; 1.4.1 Summary; 1.4.2 Chapter overviews; 1.4.3 Final remarks; 2. Implicit Interaction Alois Ferscha; 2.1 Introduction; 2.2 The Environment is the Interface; 2.3 What is Implicit Interaction?; 2.3.1 Interacting with landscapes of digital artefacts; 2.3.2 Context awareness; 2.4 Categories of Implicit Interaction; 2.4.1 Presence2.4.2 Identity2.4.3 Spatial proximity; 2.4.4 Profile; 2.4.5 Context; 2.5 Outlook; 3. Brain Computer Interfaces Ricardo Chavarriaga and Jose del R. Millan; 3.1 Introduction; 3.2 BCI Architecture: Translating Thoughts into Actions; 3.2.1 Monitoring and recording brain activity; 3.2.2 Decoding brain activity; 3.3 Applications; 3.4 Context-Aware BCI; 3.5 Practical Issues; 3.6 Discussion; 4. live scent vil stench Jenny Tillotson; 4.1 Introduction: A `Live Scent' Beginning; 4.2 Health and Wellbeing; 4.3 Sex and Procreation; 4.4 Fertility; 4.5 Diagnosis; 4.6 Entertainment; 4.7 Security4.8 Military4.9 Learning; 4.10 Finance and Consumerism; 4.11 Public Space and the Environment; 4.12 An `Evil Scent' Conclusion; 5. Reflective Computing Naturally Artificial Nikola Serbedzija; 5.1 Introduction; 5.2 Motivation: What You Need Is What You Get; 5.2.1 Growing up with reflective care; 5.2.2 Keep on playing with reflective assistance; 5.2.3 Stay independent with reflective elderly care; 5.2.4 Reflective control system; 5.3 Theoretical Consideration: Mixing the Senses; 5.3.1 Biocybernetic loop; 5.3.1.1 Awareness; 5.3.1.2 Short-term adaptation; 5.3.1.3 Long-term adaptation5.3.1.4 Pervasive adaptation5.3.2 Affective computing; 5.3.2.1 Short chronology; 5.3.3 Capturing the user status; 5.3.3.1 Overt actions; 5.3.3.2 Overt expression; 5.3.3.3 Covert expression; 5.3.3.4 Multi-modal processing; 5.3.4 Closing the loop; 5.3.5 Reflective software architecture; 5.4 Reective Deployment: Seamless and Implicit; 5.4.1 Mood player; 5.4.2 Adaptive seat; 5.4.3 Vehicle as a co-driver; 5.4.4 Reflective home nurse; 5.5 Technology Impacts Who is in Control; 5.5.1 Web used to be anonymous and distributed; 5.5.2 Computers used to be trustworthy5.5.3 Computers used to preserve privacy5.5.4 Networks are supposed to be collective; 5.6 Conclusion; 6. Healthcare in a Pervasive World Simon Dobson and Aaron Quigley; 6.1 Introduction; 6.2 The Changing Face of the Elderly in Society; 6.3 The Domain of Pervasive Healthcare; 6.3.1 Bioinformatics; 6.3.2 Niche areas; 6.4 Technological Avenues; 6.4.1 Context and situation; 6.4.2 Healthcare situations and behaviours; 6.4.3 Avoiding social isolation; 6.5 Challenges Remaining; 7. Social Networking in Mobile Pervasive Environments Gualtiero Colombo, Stuart Allen, Martin Chorley and Roger Whitaker7.1 IntroductionImagine a world where your clothes sense your blood pressure, heart rate and body temperature. Suppose the sensors transmit this information to 'the cloud', continuously and unobtrusively. Suppose artificial intelligence in 'the cloud' detects an anomaly. Suppose it tells your doctor: sighs of relief all round. But then suppose it tells an actuary, who tells your insurer, who tells your employer ... This is the world of pervasive adaptation. This Pervasive Day explores the potential - and perils - of daily living with pervasive adaptive computing. This is the result of saturating ourselves and oUbiquitous computingElectronic books.Ubiquitous computing.004004.165Pitt Jeremy952293MiAaPQMiAaPQMiAaPQBOOK9910451853103321This pervasive day2152733UNINA02223 am 2200421 n 450 991058750010332120240104030725.02-7535-8746-910.4000/books.pur.165687(CKB)4100000012892004(FrMaCLE)OB-pur-165687(PPN)267963173(EXLCZ)99410000001289200420220823j|||||||| ||| 0freuu||||||m||||Le réarmement français de 1944-1945Faire flèche de tout boisStéphane WeissRennesPresses universitaires de Rennes20221 online resource (232 p.) 2-7535-8364-1 Le programme de réarmement initié par le général de Gaulle en France, durant l’automne de 1944, demeure un sujet peu exploré, relégué dans l’ombre de l’amalgame des Forces françaises de l’intérieur au sein de la 1re armée française. Le gouvernement provisoire a vainement tenté d’obtenir en métropole un soutien américain similaire à celui intervenu pour l’équipement de huit divisions en Afrique du Nord en 1943-1944. Sous l’angle des seules livraisons de matériel allié, l’échec fut patent. Pourtant, au-delà de ce constat, la France a mis sur pied dix nouvelles divisions en métropole avant le 8 mai 1945, dont sept engagées au combat. Le gouvernement français ne s’est pas cantonné au seul levier américain ; il a emprunté des voies alternatives, en s’appuyant notamment sur des initiatives portées par des cadres issus de la Résistance. C’est à cet épisode singulier de l’histoire de la Seconde Guerre mondiale que s’attache ce livre.HistorySeconde Guerre mondialeLibérationRésistancepolitique de défenseHistorySeconde Guerre mondialeLibérationRésistancepolitique de défenseWeiss Stéphane1458351Douzou Laurent1286978FR-FrMaCLEBOOK9910587500103321Le réarmement français de 1944-19453658254UNINA