Browse Results

Showing 52,551 through 52,575 of 55,665 results

Trustworthy Artificial Intelligence Implementation: Introduction to the TAII Framework (Business Guides on the Go)

by Josef Baker-Brunnbauer

Rapidly developing Artificial Intelligence (AI) systems hold tremendous potential to change various domains and exert considerable influence on societies and organizations alike. More than merely a technical discipline, AI requires interaction between various professions. Based on the results of fundamental literature and empirical research, this book addresses the management’s awareness of the ethical and moral aspects of AI. It seeks to fill a literature gap and offer the management guidance on tackling Trustworthy AI Implementation (TAII) while also considering ethical dependencies within the company. The TAII Framework introduced here pursues a holistic approach to identifying systemic ethical relationships within the company ecosystem and considers corporate values, business models, and common goods aspects like the Sustainable Development Goals and the Universal Declaration of Human Rights. Further, it provides guidance on the implementation of AI ethics in organisations without requiring a deeper background in philosophy and considers the social impacts outside of the software and data engineering setting. Depending on the respective legal context or area of application, the TAII Framework can be adapted and used with a range of regulations and ethical principles. This book can serve as a case study or self-review for c-level managers and students who are interested in this field. It also offers valuable guidelines and perspectives for policymakers looking to pursue an ethical approach to AI.

Trustworthy Cloud Computing

by Vladimir O. Safonov

Introduces the topic of cloud computing with an emphasis on the trustworthiness of cloud computing systems and services This book describes the scientific basis of cloud computing, explaining the ideas, principles, and architectures of cloud computing as well the different types of clouds and the services they provide. The text reviews several cloud computing platforms, including Microsoft Azure, Amazon, Oracle, Google, HP, IBM, Salesforce, and Kaavo. The author addresses the problem of trustworthiness in cloud computing and provides methods to improve the security and privacy of cloud applications. The end-of-chapter exercises and supplementary material on the book's companion website will allow readers to grasp the introductory and advanced level concepts of cloud computing. Examines cloud computing platforms such as Microsoft Azure, Amazon, Oracle, Google, HP, IBM, Salesforce, and Kaavo Analyzes the use of aspect-oriented programming (AOP) for refactoring cloud services and improving the security and privacy of cloud applications Contains practical examples of cloud computing, test questions, and end-of-chapter exercises Includes presentations, examples of cloud projects and other teaching resources at the author's website (http://www.vladimirsafonov.org/cloud) Trustworthy Cloud Computing is written for advanced undergraduate and graduate students in computer science, data science, and computer engineering as well as software engineers, system architects, system managers, and software developers new to cloud computing.

Trustworthy Communications and Complete Genealogies: Unifying Ancestries for a Genealogical History of the Modern World (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Reagan W. Moore

This book discusses how a genealogical history of the modern world can be created by linking the Royal Families of Western Europeans database to Unifying Ancestry. This new edition extends the original analysis by including a coherence metric to evaluate the content of the Unifying Ancestry database, which is freely available online educational software within the CoreGen3 analysis workbench. The author discusses why common ancestors of the Royal Families of Western Europe comprise an optimal Unifying Ancestry experience and further illustrates this by using historically influential people as examples. Specifically, algorithms for validating the Unifying Ancestry are applied to a 330,000-person Research Genealogy and then used to link to historical royal descendants. Genealogical evaluation properties for consistency, correctness, closure, connectivity, completeness and coherence are demonstrated. These properties are applied to a Research Genealogy to generate a unifying ancestry for western Europeans. The unifying ancestry is then used to create a genealogical history of the modern world. All the analyses can be reproduced by readers using the Unifying Ancestry CoreGen3 program.

Trustworthy Communications and Complete Genealogies: Unifying Ancestries for a Genealogical History of the Modern World (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Reagan W. Moore

This book explains how all persons with Western European ancestry are related through a Unifying Ancestry. The author presents the knowledge metrics needed to derive the best representation for a Unifying Ancestry. The book uses example lineages to historically notable persons including relationships to U.S. Presidents, royal families, actors, and singers in order to demonstrate these points. This third edition is based upon expanded data, applying the algorithms to validate the Unifying Ancestry to a 348,844-person Research Genealogy. The author successfully demonstrates that a Unifying Ancestry with 38,533 persons is sufficient to identify familial relationships between Western Europeans.

Trustworthy Computing and Services

by Yueming Lu Xu Wu Xi Zhang

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.

Trustworthy Computing and Services

by Yuyu Yuan Xu Wu Yueming Lu

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability and fault tolerance; standards, evaluation and certification; trustworthiness of services.

Trustworthy Cyber-Physical Systems Engineering (Chapman & Hall/CRC Computer and Information Science Series #36)

by Alexander Romanovsky Fuyuki Ishikawa

From the Foreword "Getting CPS dependability right is essential to forming a solid foundation for a world that increasingly depends on such systems. This book represents the cutting edge of what we know about rigorous ways to ensure that our CPS designs are trustworthy. I recommend it to anyone who wants to get a deep look at these concepts that will form a cornerstone for future CPS designs." --Phil Koopman, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA Trustworthy Cyber-Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Topics in this book cover questions such as What does having a trustworthy CPS actually mean for something as pervasive as a global-scale CPS? How does CPS trustworthiness map onto existing knowledge, and where do we need to know more? How can we mathematically prove timeliness, correctness, and other essential properties for systems that may be adaptive and even self-healing? How can we better represent the physical reality underlying real-world numeric quantities in the computing system? How can we establish, reason about, and ensure trust between CPS components that are designed, installed, maintained, and operated by different organizations, and which may never have really been intended to work together? Featuring contributions from leading international experts, the book contains sixteen self-contained chapters that analyze the challenges in developing trustworthy CPS, and identify important issues in developing engineering methods for CPS. The book addresses various issues contributing to trustworthiness complemented by contributions on TCSP roadmapping, taxonomy, and standardization, as well as experience in deploying advanced system engineering methods in industry. Specific approaches to ensuring trustworthiness, namely, proof and refinement, are covered, as well as engineering methods for dealing with hybrid aspects.

Trustworthy Execution on Mobile Devices

by Amit Vasudevan James Newsome Jonathan M. Mccune

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Trustworthy Federated Learning: First International Workshop, FL 2022, Held in Conjunction with IJCAI 2022, Vienna, Austria, July 23, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13448)

by Randy Goebel Han Yu Boi Faltings Lixin Fan Zehui Xiong

This book constitutes the refereed proceedings of the First International Workshop, FL 2022, Held in Conjunction with IJCAI 2022, held in Vienna, Austria, during July 23-25, 2022. The 11 full papers presented in this book were carefully reviewed and selected from 12 submissions. They are organized in three topical sections: answer set programming; adaptive expert models for personalization in federated learning and privacy-preserving federated cross-domain social recommendation.

Trustworthy Global Computing

by Martín Abadi Alberto Lluch Lafuente

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in the area of global computing and safe and reliable computation. They are organized in topical sections on security, π-calculus, information flow, models, specifications and proofs and quantitative analysis.

Trustworthy Global Computing

by Pierre Ganty Michele Loreti

This book constitutes the thoroughlyrefereed post-conference proceedings of the 10th International Symposium onTrustworthy Global Computing, TGC 2015, held in Madrid, Spain, in August/September2015. The 10 revised full papers presentedwere carefully reviewed and selected from 19 submissions. The Symposium onTrustworthy Global Computing focuses on frameworks, tools, algorithms, andprotocols for open-ended, large-scale systems and applications, and on rigorousreasoning about their behavior and properties.

Trustworthy Global Computing: 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers (Lecture Notes in Computer Science #8358)

by Martín Abadi and Alberto Lluch Lafuente

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in the area of global computing and safe and reliable computation. They are organized in topical sections on security, π-calculus, information flow, models, specifications and proofs and quantitative analysis.

Trustworthy Hardware Design: Combinational Logic Locking Techniques (Analog Circuits and Signal Processing)

by Muhammad Yasin Jeyavijayan (JV) Rajendran Ozgur Sinanoglu

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.

Trustworthy Internet

by Nicola Blefari-Melazzi Giuseppe Bianchi Luca Salgarelli

This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet". The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received by the audience. The book also includes: i) an introduction by the Editors, setting the scene and presenting evolution scenarios; ii) five papers written by the session chairmen, reputed scientists, and each dedicated to a facet of the trustworthy Internet vision; iii) a concluding paper, reporting the outcomes of a panel held at the conclusion of the workshop, written by the two keynote speakers.

Trustworthy Machine Learning for Healthcare: First International Workshop, TML4H 2023, Virtual Event, May 4, 2023, Proceedings (Lecture Notes in Computer Science #13932)

by Hao Chen Luyang Luo

This book constitutes the proceedings of First International Workshop, TML4H 2023, held virtually, in May 2023.The 16 full papers included in this volume were carefully reviewed and selected from 30 submissions. The goal of this workshop is to bring together experts from academia, clinic, and industry with an insightful vision of promoting trustworthy machine learning in healthcare in terms of scalability, accountability, and explainability.

Trustworthy Online Controlled Experiments: A Practical Guide to A/B Testing

by Ya Xu Ron Kohavi Diane Tang

Getting numbers is easy; getting numbers you can trust is hard. This practical guide by experimentation leaders at Google, LinkedIn, and Microsoft will teach you how to accelerate innovation using trustworthy online controlled experiments, or A/B tests. Based on practical experiences at companies that each run more than 20,000 controlled experiments a year, the authors share examples, pitfalls, and advice for students and industry professionals getting started with experiments, plus deeper dives into advanced topics for practitioners who want to improve the way they make data-driven decisions. Learn how to • Use the scientific method to evaluate hypotheses using controlled experiments • Define key metrics and ideally an Overall Evaluation Criterion • Test for trustworthiness of the results and alert experimenters to violated assumptions • Build a scalable platform that lowers the marginal cost of experiments close to zero • Avoid pitfalls like carryover effects and Twyman's law • Understand how statistical issues play out in practice.

The Truth About HTML5

by Luke Stevens Rj Owen

The Truth About HTML5 is for web designers, web developers, and front-end coders who want to get up to speed with HTML5. The book isn't afraid to point out what everyone gets wrong about HTML5's new markup, so you donOCOt make the same mistakes. It will show you what rocks in HTML5 today and what the future holds. Marking up a basic web page shouldn't be a quasi-religious exercise where the high priests of HTML5 must be consulted for their interpretation of the holy texts (the HTML5 spec). DonOCOt waste hours trawling through confusing, poorly researched, and often flat-out wrong information on the Internet. Get the truth on HTML5's markup here. You'll also find out about HTML5's new microdata standard that's being used on major websites, such as eBay and IMDB, right now, and get the low-down on the Canvas object and what it can and can't do for you. The book also covers how HTML5 affects CMSs and web apps, what HTML5 means for mobile, and what the future holds. HTML5 isn't one big blob of technology that will be 'finished' at some point in the future. ItOCOs a grab bag of cool stuff, much of which has been around for years. Learn whatOCOs well supported and ready to go today. Now that the initial wave of hype is over, it's time to learn the truth about HTML5. "

The Truth About Life as a Pro Gamer (The Real Scoop)

by Ciara O'Neal

How does someone become a pro gamer? What do pro gamers do? Learn about how pro gamers compete, train, and more!

The Truth About Life as a YouTube Star (The Real Scoop)

by Sarah Cords

How does someone become a YouTube star? What do YouTube stars do? Learn about how YouTube stars make videos, talk to fans, and more!

Truth and Fake in the Post-Factual Digital Age: Distinctions in the Humanities and IT Sciences

by Peter Klimczak Thomas Zoglauer

The increase in fake news, the growing influence on elections, increasing false reports and targeted disinformation campaigns are not least a consequence of advancing digitalisation. Information technology is needed to put a stop to these undesirable developments. With intelligent algorithms and refined data analysis, fakes must be detected more quickly in the future and their spread prevented. However, in order to meaningfully recognize and filter fakes by means of artificial intelligence, it must be possible to distinguish fakes from facts, facts from fictions, and fictions from fakes. This book therefore also asks questions about the distinctions of fake, factual and fictional. The underlying theories of truth are discussed, and practical-technical ways of differentiating truth from falsity are outlined. By considering the fictional as well as the assumption that information-technical further development can profit from humanities knowledge, the authors hope that content-related, technical and methodological challenges of the present and future can be overcome.

Truth in Our Times: Inside the Fight for Press Freedom in the Age of Alternative Facts

by David E. McCraw

David E. McCraw recounts his experiences as the top newsroom lawyer for the New York Times during the most turbulent era for journalism in generations.In October 2016, when Donald Trump's lawyer demanded that The New York Times retract an article focused on two women that accused Trump of touching them inappropriately, David McCraw's scathing letter of refusal went viral and he became a hero of press freedom everywhere. But as you'll see in Truth in Our Times, for the top newsroom lawyer at the paper of record, it was just another day at the office.McCraw has worked at the Times since 2002, leading the paper's fight for freedom of information, defending it against libel suits, and providing legal counsel to the reporters breaking the biggest stories of the year. In short: if you've read a controversial story in the paper since the Bush administration, it went across his desk first. From Chelsea Manning's leaks to Trump's tax returns, McCraw is at the center of the paper's decisions about what news is fit to print.In Truth in Our Times, McCraw recounts the hard legal decisions behind the most impactful stories of the last decade with candor and style. The book is simultaneously a rare peek behind the curtain of the celebrated organization, a love letter to freedom of the press, and a decisive rebuttal of Trump's fake news slur through a series of hard cases. It is an absolute must-have for any dedicated reader of The New York Times.

The Truth Machine: The Blockchain and the Future of Everything

by Paul Vigna Michael J. Casey

<p>Big banks have grown bigger and more entrenched. Privacy exists only until the next hack. Credit card fraud is a fact of life. Many of the “legacy systems” once designed to make our lives easier and our economy more efficient are no longer up to the task. Yet there is a way past all this—a new kind of operating system with the potential to revolutionize vast swaths of our economy: the blockchain. <p>In <i>The Truth Machine</i>, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society’s faith in itself. They reveal the disruption it promises for industries including finance, tech, legal, and shipping. <p>Casey and Vigna expose the challenge of replacing trusted (and not-so-trusted) institutions on which we’ve relied for centuries with a radical model that bypasses them. <i>The Truth Machine</i> reveals the empowerment possible when self-interested middlemen give way to the transparency of the blockchain, while highlighting the job losses, assertion of special interests, and threat to social cohesion that will accompany this shift. With the same balanced perspective they brought to <i>The Age of Cryptocurrency</i>, Casey and Vigna show why we all must care about the path that blockchain technology takes—moving humanity forward, not backward.

Truth-Seeking in an Age of (SUNY series, Humanities to the Rescue)

by David R. Castillo, Siwei Lyu, Christina Milletti, and Cynthia Stewart

The unprecedented spread of false and misleading information is the flip side of the Internet's promise of universal access and information democratization. This volume features original contributions from scholars working on the challenge of misinformation across a wide range of STEM, humanities, and art disciplines. Modeling a collaborative, multidisciplinary "convergence approach," Truth-Seeking in an Age of (Mis)Information Overload is structured in three parts. Part 1, "Misinformation and Artificial Intelligence," confronts the danger of outsourcing judgement and decision-making to AI instruments in key areas of public life, from the processing of loan applications to school funding, policing, and criminal sentencing. Part 2, "Science Communication," foregrounds the need to rethink how scientific findings are communicated to the public, calling on scientists to cooperate with colleagues in other disciplines and community representatives to help minimize the negative effects of mis/disinformation in such vital areas as climate change science and public health. Part 3, "Building Trust," further advocates for and explores instances of trust-building initiatives as a necessary precondition of both community-oriented scholarly activity and effective intervention strategies in high impact areas such as public health.

TTYL (Internet Girls #1)

by Lauren Myracle

This book chronicles, in "instant message" format, the day-to-day experiences, feelings, and plans of three friends, Zoe, Maddie, and Angela, as they begin tenth grade.

Tube Ritual: Jumpstart Your Journey to 5000 YouTube Subscribers

by Brian G. Johnson

Everybody begins their YouTube journey from zero.You have to start with no videos, views, or subscribers. Furthermore, more than 400 minutes of content is uploaded to YouTube each minute. To say that it&’s challenging to grow a channel is an understatement! In fact, less than 3% of YouTube channels ever gain more than 10,000 subscribers. Yet, in a one-year period, Brian G Johnson gained 10,623 subscribers and drove over half a million video views. Truly beginning from zero. Brian had no previous YouTube success to draw from and had to learn the myriad of camera settings, editing options, and technical details that often become a roadblock. Furthermore, he did it in a small and competitive niche, the YouTube video marketing niche.How, you ask?By researching, testing, and tweaking various video growth methods over a one-year period in order to identify why the YouTube algorithm promotes one video over another. Ultimately, this led to the creation of a video ritual based on his findings—a series of actions according to a prescribed order. More than a mere guide, Tube Ritual is a one-year case study with the goal being to drive more views and convert more viewers into subscribers. For those already creating videos or who want to in the future, Tube Ritual contains detailed, step-by-step information that plain works. From Branding to thumbnails, video structure, YouTube SEO, video calls to action, playlist strategies, channel strategies and more, Tube Ritual leaves no stone unturned.

Refine Search

Showing 52,551 through 52,575 of 55,665 results