Given the increasing attention to managing, publishing, and preserving research datasets as scholarly assets, what competencies in working with research data will graduate students in STEM disciplines need to be successful in their fields? And what role can librarians play in helping students attain these competencies? In addressing these questions, this book articulates a new area of opportuni…
Information Systems Applications (incl.Internet); Business Information Systems; Computer Appl. in Administrative Data Processing; Management of Computing and Information Systems
Predicting the time needed to complete a project, task or daily activity can be difficult and people frequently underestimate how long an activity will take. This book sheds light on why and when this happens, what we should do to avoid it and how to give more realistic time predictions. It describes methods for predicting time usage in situations with high uncertainty, explains why two plus tw…
Taking media scholar Henry Jenkins’s concept of ‘convergence culture’ and the related notions of ‘participatory culture’ and ‘transmedia storytelling’ as points of departure, the essays compiled in the present volume provide terminological clarification, offer exemplary case studies, and discuss the broader implications of such developments for the humanities. Most of the contribu…
"This booklet documents the 36th Boehm-Bawerk Lecture, presented by Prof. Robin Mansell on October 31, 2017 as a ceremonial opening ceremony for the Institute of Media, Society and Communication at the Faculty of Social and Political Sciences. "
One of the hardest problems in science is the symbol grounding problem, a question that has intrigued philosophers and linguists for more than a century. With the rise of artificial intelligence, the question has become very actual, especially within the field of robotics. The problem is that an agent, be it a robot or a human, perceives the world in analogue signals. Yet humans have the abilit…
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a …
research agenda for e-Government. When e-Government was first conceived, it was designed upon basic technologies where the emphasis was only on the simple display of government information for citizens to read. Nowadays, e-Government design comprises many complicated modules such as upload and download consoles, two-way interaction consoles between citizens and government agents, integrated gov…
The manual construction of formal domain conceptualizations (ontologies) is labor-intensive. Ontology learning, by contrast, provides (semi-)automatic ontology generation from input data such as domain text. This thesis proposes a novel approach for learning labels of non-taxonomic ontology relations. It combines corpus-based techniques with reasoning on Semantic Web data. Corpus-based methods …
This book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research findings dealing with current practical software engineering issues and also pointers to potential future developments. Celebrating the 20th anniversary of ade…