This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002.
This comprehensive, integrated treatment of these protocols allows researchers and practitioners to quickly access protocols for their needs and become aware of protocols which have been broken.
The results show that cultural viewpoint metaphors have strong epistemic power, leveraged by a combination of theoretic foundations coming from Anthropology, Semiotics and the authors’ own work in HCI and Semiotic Engineering.
The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, ...
This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project.
Administre su servidor de una forma fácil y segura Los conocimientos que se abordan en esta obra son fundamentales para cualquier persona cuya labor profesional sea administrar un sistema informático.