Exclude:

OPAC

E-Resources

Federated Resources

Premium Resources

Showing all Resources, Excluding Opac and Electronic and Premium resources

Living and Learning with New Media

Author:Ito Mizuko, Horst Heather A., Bittanti Matteo, boyd danah, Stephenson Becky Herr, Lange Patricia G., Pascoe C. J., Robinson Laur
Publisher:The MIT Press
Abstract: This report summarizes the results of an ambitious three-year ethnographic study, funded by the Joh…

Hanging Out, Messing Around, and Geeking Out

Author:Ito Mizuko, Baumer Sonja, Bittanti Matteo, boyd danah, Cody Rachel, Stephenson Becky Herr, Horst Heather A., Lange Patricia G., Mahendran Dilan, Martínez Katynka Z., Pascoe C. J., Perkel Dan, Robinson Laura, Sims Christo, Tripp Lis
Publisher:The MIT Press
Abstract: An examination of young people's everyday new media practices—including video-game playing, text-me…

AI Knowledge Transfer from the University to Society

Author:Martín José Guadix, Lilic Milica, Martínez Marina Rosales
Publisher:esponsibilityPublisher
Abstract: AI Knowledge Transfer from the University to Society: Applications in High-Impact Sectors brings to…

Altmetrics for Digital Libraries

Author:Nuredini Kaltrin
Publisher:Logos Verlag Berlin
Abstract: The volume of scientific literature is increasing and researchers have difficulties in estimating t…

Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of S…

Author:Bauer Lujo, Küsters Ralf
Publisher:Springer Nature
Abstract: authentication; computer science; computer software selection and evaluation; cryptography; dat…

Open Source Systems: Towards Robust Practices 13th IFIP WG 2.13 International Conference, OSS 2017, Buenos Aires, Argentina, May 22-23, 2017, Proceed…

Author:Balaguer Federico, Di Cosmo Roberto, Garrido Alejandra, Kon Fabio, Robles Gregorio, Zacchiroli Stefano
Publisher:Springer Nature
Abstract: collaboration; information systems; Linux; open access; open source software

The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Eq…

Author:Lysne Ola
Publisher:Springer Nature
Abstract: cyber security; IT management; computer science; computer engineering; digital vulnerability

Scaling a Software Business: The Digitalization Journey

Author:Fitzgerald Brian, Stol Klaas-Jan, Minör Sten, Cosmo Henri
Publisher:Springer Nature
Abstract: software development; process management; collaboration; software-driven innovation

Modelling Event-Based Interactions in Component-Based Architectures for Quantitative System Evaluation

Author:Rathfelder Christop
Publisher:KIT Scientific Publishing
Abstract: This dissertation thesis presents an approach enabling the modelling and quality-of-service predict…

Model Transformation Languages with Modular Information Hiding

Author:Rentschler Andrea
Publisher:KIT Scientific Publishing
Abstract: Model transformations, together with models, form the principal artifacts in model-driven software …
Powered by: