Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2015-2019  (14)
  • Computer science
  • Computer Science  (14)
Material
Language
Years
Year
  • 1
    ISBN: 978-3-658-26763-6
    Language: German
    Pages: 1 Online-Ressource (XIV, 245 Seiten) : , Illustrationen, Diagramme.
    Parallel Title: Erscheint auch als
    DDC: 000
    RVK:
    RVK:
    Keywords: Popular Computer Science ; Artificial Intelligence ; Computational Intelligence ; Computer science ; Artificial intelligence ; Computational intelligence ; Maschinelles Lernen. ; Künstliche Intelligenz. ; Algorithmus. ; Big Data. ; Aufsatzsammlung ; Einführung ; Maschinelles Lernen ; Künstliche Intelligenz ; Maschinelles Lernen ; Künstliche Intelligenz ; Algorithmus ; Big Data
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783658210830
    Language: German
    Pages: 1 Online-Ressource (VIII, 261 Seiten) , Illustrationen
    Series Statement: Ethik in mediatisierten Welten
    Parallel Title: Erscheint auch als
    DDC: 302.2
    RVK:
    RVK:
    RVK:
    Keywords: Communication Studies ; Media Sociology ; Business Ethics ; Computers and Society ; Business ethics ; Computer science ; Künstliche Intelligenz ; Ethik ; Robotik ; Autonomes System ; Maschine ; Mensch-Maschine-System ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Ethik ; Maschine ; Maschine ; Mensch-Maschine-System ; Künstliche Intelligenz ; Autonomes System ; Robotik ; Ethik
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 978-3-662-56437-0
    Language: German
    Pages: XI, 398 Seiten : , Illustrationen, Diagramme.
    Parallel Title: Erscheint auch als
    RVK:
    RVK:
    RVK:
    Keywords: Computer science ; Management ; Industrial management ; Computer industry ; Computers and civilization ; Law and economics ; Computer Science ; Digitalisierung. ; Technischer Fortschritt. ; Digitalisierung ; Technischer Fortschritt
    Abstract: Geleitwort -- Vorwort -- Digitalisierung im Spannungsfeld der grundgesetzlichen Kompetenzträger -- Selbstverwaltete digitale Identitäten -- Die Digitalisierung des Besteuerungsverfahrens -- Digitale Werkzeuge im Spannungsfeld zwischen Spielen und Lernen im naturwissenschaftlichen Unterricht -- Standardisierung in der digitalen Finanzberichterstattung -- Die Geschenk-Ökonomie der digitalen Gesellschaft -- Legal Tech -- Der digitale Nachlass -- Arbeitszeit und Ort 4.0 -- Economy on Demand am Beispiel von Crowdworking -- Hilfsmittel zur Steuererhebung -- Digitalisierung und Industrie 4.0 -- Herausforderungen des Rechtsstaats im Zeitalter der Digitalisierung -- Sichere Software im Umfeld von Industrie 4.0 -- Ohne IT-Sicherheit gelingt keine nachhaltige Digitalisierung -- Politik unter den Rahmenbedingungen der Digitalisierung -- Die Digitalisierung im Rechtsmarkt -- Glückliche/zufriedene Mitarbeiter -- Auswirkungen des Einsatzes von 3D-Druckern auf die Besteuerung im Land des privaten Abnehmers -- „Weiterbildung 4.0“ für die Wirtschaft 4.0 -- Digitalisierung und MemberValue -- Rechtliche Herausforderungen der Digitalisierung -- Industrie 4.0 aus Perspektive der nachhaltigen industriellen Wertschöpfung -- Die digitale Wirtschaft: Was ändert sich am Arbeitsmarkt? -- Herausforderungen der Digitalisierung aus der Perspektive der öffentlichen Verwaltung -- Digitalisierung der Arbeitswelt -- Der Notar als Digitalisierungsmuffel
    Abstract: Dieses Beitragswerk bringt Vorreiter, öffentliche Meinungsbildner und renommierte Fachexperten zu Fragestellungen des digitalen Wandels zusammen und bündelt deren Blickwinkel auf dieses entscheidende Zukunftsthema. Somit beleuchten die hochkarätigen Autoren aus Politik, Wirtschaft, Wissenschaft und Recht mit ihren Beiträgen, in zwei Bänden des Herausgeberwerkes, unterschiedliche Facetten der Digitalisierung. Dabei wird bewusst kein abschließendes, wertendes Fazit vorweggenommen - gerade die durchaus kontroversen Sichtweisen der Autoren tragen zum Mehrwert des vorliegenden Werkes und insbesondere der gesellschaftlichen Diskussion zum digitalen Wandel bei.  Die Herausgeber Prof. Dr. Christian Bär ist als Chief Digital Officer für die digitale Transformation der DATEV eG in der Geschäftsleitung verantwortlich. Zusätzlich ist er als Professor für Wirtschaftsinformatik, insbesondere Prozess- und Projektmanagement, an der Steinbeis-Hochschule Berlin tätig. Prof. Dr. Thomas Grädler, LL.M., ist Rechtsanwalt und Steuerberater in der auf Gesellschafts-, Steuerrecht und M&A spezialisierten Kanzlei honert + partner mbB, München. Er ist zudem Lehrbeauftragter an der Universität Bayreuth und Professor für Wirtschaftsrecht, insb. Unternehmenstransaktionen und Gesellschaftsrecht, sowie Steuerlehre an der Steinbeis-Hochschule Berlin. Dr. Robert Mayr ist Steuerberater und Vorstandsvorsitzender der DATEV eG. Zudem war er von 2000 bis 2011 als Wirtschaftsprüfer tätig. Zu seinen wichtigsten beruflichen Stationen, vor seinem Wechsel in den Vorstand der DATEV im April 2011, zählen eine neunjährige Geschäftsführertätigkeit bei einer großen deutschen Wirtschaftsprüfungsgesellschaft sowie zwischen 1994 und 2001 führende Aufgaben in den Bereichen Wirtschaftsprüfung und Transaktionsberatung bei Deloitte
    Note: "Weiterbildung 4.0" für die Wirtschaft 4.0
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 978-3-658-21621-4
    Language: German
    Pages: 1 Online-Ressource (XXI, 215 Seiten 40 Abb., 34 Abb. in Farbe).
    Parallel Title: Erscheint auch als
    DDC: 004
    RVK:
    RVK:
    RVK:
    Keywords: Computers and Society ; Systems and Data Security ; Legal Aspects of Computing ; Political Communication ; Computer science ; Data protection ; Computers / Law and legislation ; Political communication ; Bürgerbeteiligung. ; Partizipation. ; Privatsphäre. ; Neue Medien. ; Aufsatzsammlung ; Bürgerbeteiligung ; Partizipation ; Privatsphäre ; Bürgerbeteiligung ; Neue Medien
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 978-3-662-56438-7
    Language: German
    Pages: 1 Online-Ressource (XI, 398 Seiten 38 Abb., 20 Abb. in Farbe).
    Parallel Title: Erscheint auch als
    DDC: 005.7
    RVK:
    RVK:
    RVK:
    Keywords: Computer science ; Management ; Industrial management ; Computer industry ; Computers and civilization ; Law and economics ; Computer Science ; Information Systems Applications (incl. Internet) ; The Computer Industry ; Computers and Society ; Law and Economics ; Innovation/Technology Management ; Digitalisierung. ; Technischer Fortschritt. ; Digitalisierung ; Technischer Fortschritt
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783662540336
    Language: English
    Pages: 1 Online-Ressource (xii, 261 Seiten)
    Series Statement: The Frontiers Collection
    Parallel Title: Erscheint auch als The technological singularity
    Parallel Title: Print version Callaghan, Victor The Technological Singularity : Managing the Journey
    DDC: 100
    RVK:
    Keywords: Computer science ; Electronic books ; Einzigkeit ; Technischer Fortschritt ; Wissenschaftsethik ; Künstliche Intelligenz ; Risikomanagement
    Abstract: Foreword -- References -- Acknowledgements -- Contents -- 1 Introduction to the Technological Singularity -- 1.1 Why the "Singularity" Is Important -- 1.2 Superintelligence, Superpowers -- 1.3 Danger, Danger! -- 1.4 Uncertainties and Safety -- References -- Risks of, and Responses to, the Journey to the Singularity -- 2 Risks of the Journey to the Singularity -- 2.1 Introduction -- 2.2 Catastrophic AGI Risk -- 2.2.1 Most Tasks Will Be Automated -- 2.2.2 AGIs Might Harm Humans -- 2.2.3 AGIs May Become Powerful Quickly -- 2.2.3.1 Hardware Overhang -- 2.2.3.2 Speed Explosion -- 2.2.3.3 Intelligence Explosion -- References -- 3 Responses to the Journey to the Singularity -- 3.1 Introduction -- 3.2 Post-Superintelligence Responses -- 3.3 Societal Proposals -- 3.3.1 Do Nothing -- 3.3.1.1 AI Is Too Distant to Be Worth Our Attention -- 3.3.1.2 Little Risk, no Action Needed -- 3.3.1.3 Let Them Kill Us -- 3.3.1.4 "Do Nothing" Proposals-Our View -- 3.3.2 Integrate with Society -- 3.3.2.1 Legal and Economic Controls -- 3.3.2.2 Foster Positive Values -- 3.3.2.3 "Integrate with Society" Proposals-Our View -- 3.3.3 Regulate Research -- 3.3.3.1 Review Boards -- 3.3.3.2 Encourage Research into Safe AGI -- 3.3.3.3 Differential Technological Progress -- 3.3.3.4 International Mass Surveillance -- 3.3.3.5 "Regulate Research" Proposals-Our View -- 3.3.4 Enhance Human Capabilities -- 3.3.4.1 Would We Remain Human? -- 3.3.4.2 Would Evolutionary Pressures Change Us? -- 3.3.4.3 Would Uploading Help? -- 3.3.4.4 "Enhance Human Capabilities" Proposals-Our View -- 3.3.5 Relinquish Technology -- 3.3.5.1 Outlaw AGI -- 3.3.5.2 Restrict Hardware -- 3.3.5.3 "Relinquish Technology" Proposals-Our View -- 3.4 External AGI Constraints -- 3.4.1 AGI Confinement -- 3.4.1.1 Safe Questions -- 3.4.1.2 Virtual Worlds -- 3.4.1.3 Resetting the AGI -- 3.4.1.4 Checks and Balances
    Abstract: 3.4.1.5 "AI Confinement" Proposals-Our View -- 3.4.2 AGI Enforcement -- 3.4.2.1 "AGI Enforcement" Proposals-Our View -- 3.5 Internal Constraints -- 3.5.1 Oracle AI -- 3.5.1.1 Oracles Are Likely to Be Released -- 3.5.1.2 Oracles Will Become Authorities -- 3.5.1.3 "Oracle AI" Proposals-Our View -- 3.5.2 Top-Down Safe AGI -- 3.5.2.1 Three Laws -- 3.5.2.2 Categorical Imperative -- 3.5.2.3 Principle of Voluntary Joyous Growth -- 3.5.2.4 Utilitarianism -- 3.5.2.5 Value Learning -- 3.5.2.6 Approval-Directed Agents -- 3.5.2.7 "Top-Down Safe AGI" Proposals-Our View -- 3.5.3 Bottom-up and Hybrid Safe AGI -- 3.5.3.1 Evolutionary Invariants -- 3.5.3.2 Evolved Morality -- 3.5.3.3 Reinforcement Learning -- 3.5.3.4 Human-like AGI -- 3.5.3.5 "Bottom-up and Hybrid Safe AGI" Proposals-Our View -- 3.5.4 AGI Nanny -- 3.5.4.1 "AGI Nanny" Proposals-Our View -- 3.5.5 Motivational Scaffolding -- 3.5.6 Formal Verification -- 3.5.6.1 "Formal Verification" Proposals-Our View -- 3.5.7 Motivational Weaknesses -- 3.5.7.1 High Discount Rates -- 3.5.7.2 Easily Satiable Goals -- 3.5.7.3 Calculated Indifference -- 3.5.7.4 Programmed Restrictions -- 3.5.7.5 Legal Machine Language -- 3.5.7.6 "Motivational Weaknesses" Proposals-Our View -- 3.6 Conclusion -- Acknowledgementss -- References -- Managing the Singularity Journey -- 4 How Change Agencies Can Affect Our Path Towards a Singularity -- 4.1 Introduction -- 4.2 Pre-singularity: The Dynamic Process of Technological Change -- 4.2.1 Paradigm Shifts -- 4.2.2 Technological Change and Innovation Adoption -- 4.2.3 The Change Agency Perspective -- 4.2.3.1 Business Organisations as Agents of Change in Innovation Practice -- 4.2.3.2 Social Networks as Agents of Change -- 4.2.3.3 The Influence of Entrepreneurs as Agents of Change -- 4.2.3.4 Nation States as Agents of Change -- 4.3 Key Drivers of Technology Research and Their Impact
    Abstract: 4.4 The Anti-singularity Postulate -- 4.5 Conclusions -- References -- 5 Agent Foundations for Aligning Machine Intelligence with Human Interests: A Technical Research Agenda -- 5.1 Introduction -- 5.1.1 Why These Problems? -- 5.2 Highly Reliable Agent Designs -- 5.2.1 Realistic World-Models -- 5.2.2 Decision Theory -- 5.2.3 Logical Uncertainty -- 5.2.4 Vingean Reflection -- 5.3 Error-Tolerant Agent Designs -- 5.4 Value Specification -- 5.5 Discussion -- 5.5.1 Toward a Formal Understanding of the Problem -- 5.5.2 Why Start Now? -- References -- 6 Risk Analysis and Risk Management for the Artificial Superintelligence Research and Development Process -- 6.1 Introduction -- 6.2 Key ASI R&D Risk and Decision Issues -- 6.3 Risk Analysis Methods -- 6.3.1 Fault Trees -- 6.3.2 Event Trees -- 6.3.3 Estimating Parameters for Fault Trees and Event Trees -- 6.3.4 Elicitation of Expert Judgment -- 6.3.5 Aggregation of Data Sources -- 6.4 Risk Management Decision Analysis Methods -- 6.5 Evaluating Opportunities for Future Research -- 6.6 Concluding Thoughts -- Acknowledgements -- References -- 7 Diminishing Returns and Recursive Self Improving Artificial Intelligence -- 7.1 Introduction -- 7.2 Self-improvement -- 7.2.1 Evolutionary Algorithms -- 7.2.2 Learning Algorithms -- 7.3 Limits of Recursively Improving Intelligent Algorithms -- 7.3.1 Software Improvements -- 7.3.2 Hardware Improvements -- 7.4 The Takeaway -- References -- 8 Energy, Complexity, and the Singularity -- 8.1 A Contradiction -- 8.2 Challenges -- 8.2.1 Climate Change -- 8.2.2 Biodiversity and Ecosystem Services -- 8.2.3 Energy-or, Where's My Jetsons Car? -- 8.2.4 The Troubles with Science -- 8.3 Energy and Complexity -- 8.4 Exponentials and Feedbacks -- 8.5 Ingenuity, not Data Processing -- 8.6 In Summary -- Acknowledgements -- References
    Abstract: 9 Computer Simulations as a Technological Singularity in the Empirical Sciences -- 9.1 Introduction -- 9.2 The Anthropocentric Predicament -- 9.3 The Reliability of Computer Simulations -- 9.3.1 Verification and Validation Methods -- 9.4 Final Words -- References -- 10 Can the Singularity Be Patented? (And Other IP Conundrums for Converging Technologies) -- 10.1 Introduction -- 10.2 A Singular Promise -- 10.3 Intellectual Property -- 10.3.1 Some General IP Problems in Converging Technologies -- 10.3.2 Some Gaps in IP Relating to the Singularity -- 10.4 Limits to Ownership and Other Monopolies -- 10.5 Owning the Singularity -- 10.6 Ethics, Patents and Artificial Agents -- 10.7 The Open Alternative -- References -- 11 The Emotional Nature of Post-Cognitive Singularities -- 11.1 Technological Singularity: Key Concepts -- 11.1.1 Tools and Methods -- 11.1.2 Singularity: Main Hypotheses -- 11.1.3 Implications of Post-singularity Entities with Advanced, Meta-cognitive Intelligence Ruled by Para-emotions -- 11.2 Post-cognitive Singularity Entities and their Physical Nature -- 11.2.1 Being a Singularity Entity -- 11.2.1.1 Super-intelligent Entities -- 11.2.1.2 Transhumans -- 11.2.2 Post Singularity Entities as Living Systems? -- 11.3 Para-emotional Systems -- 11.4 Conclusions -- Acknowledgements -- References -- 12 A Psychoanalytic Approach to the Singularity: Why We Cannot Do Without Auxiliary Constructions -- 12.1 Introduction -- 12.2 AI and Intelligence -- 12.3 Consciousness -- 12.4 Reason and Emotion -- 12.5 Psychoanalysis -- 12.6 Conclusion -- References -- Reflections on the Journey -- 13 Reflections on the Singularity Journey -- 13.1 Introduction -- 13.2 Eliezer Yudkowsky -- 13.2.1 The Event Horizon -- 13.2.2 Accelerating Change -- 13.2.3 The Intelligence Explosion -- 13.2.4 MIRI and LessWrong -- 13.3 Scott Aaronson -- 13.4 Stuart Armstrong
    Abstract: 13.5 Too Far in the Future -- 13.6 Scott Siskind -- 13.6.1 Wireheading -- 13.6.2 Work on AI Safety Now -- 14 Singularity Blog Insights -- 14.1 Three Major Singularity Schools -- 14.2 AI Timeline Predictions: Are We Getting Better? -- 14.3 No Time Like the Present for AI Safety Work -- 14.4 The Singularity Is Far -- Appendix -- The Coming Technological Singularity: How to Survive in the Post-human Era (reprint) -- References -- References -- Titles in this Series
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berlin :Spektrum der Wissenschaft, Springer,
    ISBN: 978-3-662-53836-4
    Language: German
    Pages: 1 Online-Ressource (XV, 283 Seiten) : , Illustrationen.
    Parallel Title: Erscheint auch als
    DDC: 000
    RVK:
    RVK:
    RVK:
    Keywords: Popular works ; Artificial intelligence ; Computers and civilization ; Educational technology ; Computer science ; Engineering ; Popular Science ; Popular Computer Science ; Computers and Society ; Engineering, general ; Artificial Intelligence (incl. Robotics) ; Technology and Digital Education ; Digital/New Media ; Informatik ; Ingenieurwissenschaften ; Künstliche Intelligenz ; Informationsgesellschaft. ; Digitale Revolution. ; Privatheit. ; Datenschutz. ; Selbstbestimmung. ; Aufsatzsammlung ; Informationsgesellschaft ; Digitale Revolution ; Privatheit ; Datenschutz ; Selbstbestimmung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    New York, NY : Apress, Springer Science+Business Media
    ISBN: 9781484220580
    Language: English
    Pages: xxv, 279 Seiten , Illustrationen , 184 x 254 x 19
    Series Statement: Books for professionals by professionals
    Parallel Title: Erscheint auch als Hicks, Richard M. Implementing DirectAccess with Windows Server 2016
    Parallel Title: Erscheint auch als Hicks, Richard M. Implementing DirectAccess with Windows Server 2016
    RVK:
    Keywords: Computer science ; Computer system failures ; Operating systems (Computers) ; Datenbankverwaltung ; Windows Server 2016
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9781107060432
    Language: English
    Pages: xv, 535 Seiten , Diagramme
    DDC: 302/.130285
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Social choice ; Interdisciplinary research ; Computer science ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik ; Aufsatzsammlung ; Aufsatzsammlung ; Kollektiventscheidung ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9781107446984
    Language: English
    Pages: 1 Online-Ressource (xv, 535 Seiten) , Diagramme
    Parallel Title: Erscheint auch als
    DDC: 302/.130285
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Social choice ; Interdisciplinary research ; Computer science ; Kollektiventscheidung ; Computerunterstütztes Verfahren ; Public-Choice-Theorie ; Informatik ; Kollektiventscheidung ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik
    Note: Auf der Frontpage: "Online publication date: May 2016" , Title from publisher's bibliographic system (viewed on 05 May 2016)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9783319219547
    Language: English
    Pages: Online-Ressource
    Edition: Springer eBook Collection. Computer Science
    Series Statement: Human-Computer Interaction Series
    DDC: 005.437
    RVK:
    RVK:
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Social sciences ; Ethnomethodologie ; Design Thinking ; Wissenschaftskritik
    Abstract: This book aims to deconstruct ethnography to alert systems designers, and other stakeholders, to the issues presented by new approaches that move beyond the studies of ‘work’ and ‘work practice’ within the social sciences (in particular anthropology and sociology). The theoretical and methodological apparatus of the social sciences distort the social and cultural world as lived in and understood by ordinary members, whose common-sense understandings shape the actual milieu into which systems are placed and used.  In Deconstructing Ethnography the authors show how ‘new’ calls are returning systems design to ‘old’ and problematic ways of understanding the social. They argue that systems design can be appropriately grounded in the social through the ordinary methods that members use to order their actions and interactions.  This work is written for post-graduate students and researchers alike, as well as design practitioners who have an interest in bringing the social to bear on design in a systematic rather than a piecemeal way. This is not a ‘how to’ book, but instead elaborates the foundations upon which the social can be systematically built into the design of ubiquitous and interactive systems
    Description / Table of Contents: IntroductionBuilding the Social into System Design -- Ethnography as Cultural Theory -- ‘New’ Ethnography and Ubiquitous Computing -- Interpretation, Reflexivity and Objectivity -- The Missing What of Ethnographic Studies -- Ethnography, Ethnomethodology and Design -- Members’ Not Ethnographers’ Methods.
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Cham : Springer
    ISBN: 9783319227351
    Language: English
    Pages: Online-Ressource (xiii, 126 pages) , illustrations (some color)
    Edition: 1st ed. 2015
    Edition: Online-Ausg. Springer eBook Collection. Computer Science
    DDC: 302.30285
    RVK:
    Keywords: Computer science ; Application software ; Graph theory ; Soziales Netzwerk ; Informatik ; Graphentheorie ; Anwender-Software ; Empfehlungssystem ; Verhaltensforschung
    Abstract: This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters cover a wide range of models and algorithms, including graph models and a personalized PageRank model. Extensive experiments and scenarios using real world datasets from GitHub, Facebook, Twitter, Google Plus and the European Union ICT research collaborations serve to enhance reader understanding of the material with clear applications. Each chapter concludes with an analysis and detailed summary. Social Network-Based Recommender Systems is designed as a reference for professionals and researchers working in social network analysis and companies working on recommender systems. Advanced-level students studying computer science, statistics or mathematics will also find this books useful as a secondary text
    Description / Table of Contents: Overview of Social Recommender SystemsLink Prediction for Directed Graphs -- Follow Recommendation in Communities -- Partner Recommendation -- Social Broker Recommendation -- Conclusion.
    Note: Includes bibliographical references at the end of each chapters
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9783319279329
    Language: English
    Pages: 1 Online-Ressource ( XII, 208 Seiten)
    Series Statement: Lecture notes in computer science 9398
    DDC: 025.04
    RVK:
    Keywords: Computer Science ; Computer science ; Database management ; Information storage and retrieval ; Multimedia information systems ; Text processing (Computer science) ; User interfaces (Computer systems) ; Informatik ; Semantic Web ; Information Retrieval ; Künstliche Intelligenz ; Maschinelles Lernen ; Natürliche Sprache
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...