000 | 06073nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-030-85610-6 | ||
003 | DE-He213 | ||
005 | 20240730203529.0 | ||
007 | cr nn 008mamaa | ||
008 | 210825s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030856106 _9978-3-030-85610-6 |
||
024 | 7 |
_a10.1007/978-3-030-85610-6 _2doi |
|
050 | 4 | _aQA76.9.U83 | |
050 | 4 | _aQA76.9.H85 | |
072 | 7 |
_aUYZ _2bicssc |
|
072 | 7 |
_aCOM079010 _2bisacsh |
|
072 | 7 |
_aUYZ _2thema |
|
082 | 0 | 4 |
_a005.437 _223 |
082 | 0 | 4 |
_a004.019 _223 |
245 | 1 | 0 |
_aHuman-Computer Interaction - INTERACT 2021 _h[electronic resource] : _b18th IFIP TC 13 International Conference, Bari, Italy, August 30 - September 3, 2021, Proceedings, Part IV / _cedited by Carmelo Ardito, Rosa Lanzilotti, Alessio Malizia, Helen Petrie, Antonio Piccinno, Giuseppe Desolda, Kori Inkpen. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXXXV, 744 p. 32 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v12935 |
|
505 | 0 | _aLattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption -- Evidence Collection and Preservation System with Virtual Machine Monitoring -- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures -- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions -- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.-Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices -- FFT Program Generation for Ring LWE-based Cryptography -- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure -- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures -- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH -- Simple Matrix Signature Scheme -- Game Theory and Security Moving Target Defense for the CloudControl Game. | |
520 | _aThe five-volume set LNCS 12932-12936 constitutes the proceedings of the 18th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2021, held in Bari, Italy, in August/September 2021. The total of 105 full papers presented together with 72 short papers and 70 other papers in these books was carefully reviewed and selected from 680 submissions. The contributions are organized in topical sections named: Part I: affective computing; assistive technology for cognition and neurodevelopment disorders; assistive technology for mobility and rehabilitation; assistive technology for visually impaired; augmented reality; computer supported cooperative work. Part II: COVID-19 & HCI; croudsourcing methods in HCI; design for automotive interfaces; design methods; designing for smart devices & IoT; designing for the elderly and accessibility; education and HCI; experiencing sound and music technologies; explainable AI. Part III: games and gamification; gesture interaction; human-centered AI; human-centered development of sustainable technology; human-robot interaction; information visualization; interactive design and cultural development. Part IV: interaction techniques; interaction with conversational agents; interaction with mobile devices; methods for user studies; personalization and recommender systems; social networks and social media; tangible interaction; usable security. Part V: user studies; virtual reality; courses; industrial experiences; interactive demos; panels; posters; workshops. The chapter 'Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training' is open access under a CC BY 4.0 license at link.springer.com. The chapter 'WhatsApp in Politics?! Collaborative Tools Shifting Boundaries' is open access under a CC BY 4.0 license at link.springer.com. | ||
650 | 0 |
_aUser interfaces (Computer systems). _911681 |
|
650 | 0 |
_aHuman-computer interaction. _96196 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aApplication software. _9176454 |
|
650 | 1 | 4 |
_aUser Interfaces and Human Computer Interaction. _931632 |
650 | 2 | 4 |
_aComputer Communication Networks. _9176455 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9176456 |
700 | 1 |
_aArdito, Carmelo. _eeditor. _0(orcid) _10000-0001-8993-9855 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176457 |
|
700 | 1 |
_aLanzilotti, Rosa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176458 |
|
700 | 1 |
_aMalizia, Alessio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176459 |
|
700 | 1 |
_aPetrie, Helen. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176460 |
|
700 | 1 |
_aPiccinno, Antonio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176461 |
|
700 | 1 |
_aDesolda, Giuseppe. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176462 |
|
700 | 1 |
_aInkpen, Kori. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9176463 |
|
710 | 2 |
_aSpringerLink (Online service) _9176464 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030856090 |
776 | 0 | 8 |
_iPrinted edition: _z9783030856113 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v12935 _9176465 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-85610-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c97544 _d97544 |