LEADER 04109oam 2200553 450 001 996466111003316 005 20210804195532.0 010 $a3-540-49247-X 024 7 $a10.1007/3-540-49247-X 035 $a(CKB)1000000000211018 035 $a(SSID)ssj0000321936 035 $a(PQKBManifestationID)11233998 035 $a(PQKBTitleCode)TC0000321936 035 $a(PQKBWorkID)10282214 035 $a(PQKB)11735576 035 $a(DE-He213)978-3-540-49247-4 035 $a(MiAaPQ)EBC3072456 035 $a(MiAaPQ)EBC6494938 035 $a(PPN)15520663X 035 $a(EXLCZ)991000000000211018 100 $a20210804d1998 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aCommunity computing and support systems $esocial interaction in networked communities /$fToru Ishida, editor 205 $a1st ed. 1998. 210 1$aBerlin ;$aHeidelberg :$cSpringer,$d[1998] 210 4$d©1998 215 $a1 online resource (VII, 395 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1519 300 $aPapers presented at the Kyoto Meeting on Social Interaction and Communityware held June 8-10, 1998 in Kyoto, Japan. 311 $a3-540-65475-5 320 $aIncludes bibliographical references and index. 327 $aOverview -- Towards Computation over Communities -- Methodology for Large Scale Experimentation A Discussion Report -- Models and Concepts -- Complexity and Adaptation in Community Information Systems: Implications for Design -- How TRURL Evolves Multiagent Worlds for Social Interaction Analysis -- Agent Based Approach for Social Complex Systems - Management of Constructed Social World -- Awareness - The Common Link Between Groupware and Community Support Systems -- Social Psychological and Artistic Aspects of the Human Interface -- Methodologies for Large Scale Trials -- Demographics and Sociographics of the Digital City -- Groupware, Community, and Meta-Networks: the Collaborative Framework of EdNA (Education Network Australia) -- C-MAP: Building a Context-Aware Mobile Assistant for Exhibition Tours -- Managing Large Scale On-line Discussions: Secrets of the Open Meeting -- Social Pattern Development Analysis: A Case Study in a Regional Community Network -- Sharing Knowledge and Preference in Communities -- CoMeMo-Community: A System for Supporting Community Knowledge Evolution -- IKNOW: A Tool to Assist and Study the Creation, Maintenance, and Dissolution of Knowledge Networks -- Building Agent Community toward Business Knowledge Base Generation -- Building Information Infrastructures for Social Worlds ? The Role of Classifications and Standards -- Supporting Social Interaction in Communities -- Interactional Resources for the Support of Collaborative Activities: Common Problems in the Design of Technologies to Support Groups and Communities -- Interactive Consultation System with Asymmetrical Communication between People in Different Electronic Communities -- Communities through Time: Using History for Social Navigation -- Reflections of Communities in Virtual Environments: The Mirror -- Silhouettell: Awareness Support for Real-World Encounter -- Agent Technologies in Communities -- Supporting Network Communities with Multiagent Systems -- Agent Augmented Community: Human-to-Human and Human-to-Environment Interactions Enhanced by Situation-Aware Personalized Mobile Agents -- Community Formation via a Distributed, Privacy-Protecting Matchmaking System -- SYMBIOT: Personalizing Agents in Social Contexts. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1519 606 $aElectronic villages (Computer networks)$vCongresses 615 0$aElectronic villages (Computer networks) 676 $a307 702 $aIshida$b Toru 712 12$aKyoto Meeting on Social Interaction and Communityware$f(1998), 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996466111003316 996 $aCommunity computing and support systems$91501982 997 $aUNISA LEADER 06998nam 22008295 450 001 9910300250103321 005 20200701104722.0 010 $a3-319-18275-7 024 7 $a10.1007/978-3-319-18275-9 035 $a(CKB)3710000000476914 035 $a(EBL)4089841 035 $a(SSID)ssj0001584963 035 $a(PQKBManifestationID)16265245 035 $a(PQKBTitleCode)TC0001584963 035 $a(PQKBWorkID)14865285 035 $a(PQKB)10237775 035 $a(DE-He213)978-3-319-18275-9 035 $a(MiAaPQ)EBC4089841 035 $a(PPN)190516410 035 $a(EXLCZ)993710000000476914 100 $a20150915d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aComputation, Cryptography, and Network Security /$fedited by Nicholas J. Daras, Michael Th. Rassias 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (754 p.) 300 $aDescription based upon print version of record. 311 $a3-319-18274-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $aTransformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite?Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang?Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang?Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal). 330 $aAnalysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.   This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current ?state-of-the-art,? and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.  . 606 $aAlgebra 606 $aOrdered algebraic structures 606 $aNumber theory 606 $aCoding theory 606 $aInformation theory 606 $aApproximation theory 606 $aComputer organization 606 $aOperations research 606 $aManagement science 606 $aOrder, Lattices, Ordered Algebraic Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/M11124 606 $aNumber Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/M25001 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aApproximations and Expansions$3https://scigraph.springernature.com/ontologies/product-market-codes/M12023 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aOperations Research, Management Science$3https://scigraph.springernature.com/ontologies/product-market-codes/M26024 615 0$aAlgebra. 615 0$aOrdered algebraic structures. 615 0$aNumber theory. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aApproximation theory. 615 0$aComputer organization. 615 0$aOperations research. 615 0$aManagement science. 615 14$aOrder, Lattices, Ordered Algebraic Structures. 615 24$aNumber Theory. 615 24$aCoding and Information Theory. 615 24$aApproximations and Expansions. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aOperations Research, Management Science. 676 $a510 702 $aDaras$b Nicholas J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRassias$b Michael Th$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910300250103321 996 $aComputation, cryptography, and network security$91522654 997 $aUNINA LEADER 03487nam 22006134a 450 001 9910144122903321 005 20241120173211.0 010 $a9786611979096 010 $a9781281979094 010 $a1281979090 010 $a9789048501571 010 $a9048501571 024 8 $ahttps://doi.org/10.5117/9789053569122 035 $a(CKB)1000000000555141 035 $a(EBL)419810 035 $a(OCoLC)437106799 035 $a(SSID)ssj0000295477 035 $a(PQKBManifestationID)12063286 035 $a(PQKBTitleCode)TC0000295477 035 $a(PQKBWorkID)10314636 035 $a(PQKB)10601427 035 $a(MiAaPQ)EBC419810 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/29715 035 $a(ScCtBLL)1482387f-a2b0-403d-a18e-e15e4708f5bd 035 $a(oapen)doab29715 035 $a(EXLCZ)991000000000555141 100 $a20081107d2007 uy 0 101 0 $adut 135 $aurmn#---uuuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aErfgoed $ede geschiedenis van een begrip /$fFrans Grijzenhout (red.) 210 $aAmsterdam $cAmsterdam University Press$d2007 215 $a1 online resource (337 pages) $cillustrations 225 1 $aReeks Nederlandse begripsgeschiedenis 300 $aDescription based upon print version of record. 311 08$a9789053569122 311 08$a905356912X 320 $aIncludes bibliographical references and indexes. 327 $aInhoud; Inleiding; Erfgoed: de juridische herkomstvan een metafoor; Hemels erfgoed: een reflectie; Antiquitates: voorvaderlijkeoudheden; Archieven: munimenta enmonumenta; Vaderlandse oudheden; Erflaters: levensbeschrijvingenvan voorbeeldige Nederlanders; Monumenten: architectonischeoverblijfselen; Monumenten van natuur enschoonheid; Literair erfgoed: van oudevodden en klassieken; Archeologisch erfgoed: eenonbeheersbaar concept; Tegen het erfgoed: overvooruitgang en vandalisme 330 $aThe word 'heritage' is nowadays mainly used in the term pair 'cultural heritage'. Another use of the word 'heritage' focuses precisely on the intangible meaning of the word. This includes the spiritual legacy of a thinker or artist. In the latter sense, the term 'heritage' has a longer history than in the first. In Heritage. The history of a concept reconstructs and analyzes the different histories of the concept. First of all, attention is paid to the legal origin and development of the word 'heritage'. Willem Frijhoff highlights its religious dimension. Other authors focus on related concepts, such as 'monument' or 'antiquities'. Eco Haitsma Mulier pays attention to the concept of 'testators', made famous by the famous Erflaters publication of our civilization by Jan and Annie Romein (1938). Eric Ketelaar, Gerard Rooijakkers and others each discuss a specific field of action within the cultural heritage: archives, literature, archeology, folklore. The collection ends with a reflection by Wessel Krul on the need of some to oppose the heritage idea or even the urge to destroy heritage. 410 0$aReeks Nederlandse begripsgeschiedenis. 606 $aCultural property$zNetherlands 607 $aNetherlands$xCivilization 615 0$aCultural property 676 $a949.2 701 $aGrijzenhout$b F$g(Frans)$0800838 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910144122903321 996 $aErfgoed$91802149 997 $aUNINA