Browse Results

Showing 70,126 through 70,150 of 73,716 results

Trust in Construction Projects (Spon Research)

by Anita Cerić

The relationship between project managers representing project owners and those on the contractor side is often threatened by communication risk. The main communication risk minimization strategy in the construction phase is trust, which plays a major role in the success of key working relationships across the construction industry. This book investigates this phenomenon, and goes on to show that once developed, trust outshines all other strategies of communication risk minimization and is essential for project success. As part of this investigation, communication risk in construction projects is examined in detail, with a particular focus on the effects of information asymmetry on working relationships. Drawing on many years of empirical research involving project managers working internationally, Trust in Construction Projects also provides strategies to minimize information asymmetries in order to build trust, and ensure the success of construction projects. By increasing understanding of trust in construction projects, this book adds an important new perspective to the fields of construction management and project management. This is essential reading for researchers and students, as well as practitioners in these fields.

Trust in Military Teams (Human Factors in Defence)

by Neville A. Stanton

The objective of this book is to report on contemporary trends in the defence research community on trust in teams, including inter- and intra-team trust, multi-agency trust and coalition trust. The book also considers trust in information and automation, taking a systems view of humans as agents in a multi-agent, socio-technical, community. The different types of trust are usually found to share many of the same emotive, behavioural, cognitive and social constructs, but differ in the degree of importance associated with each of them. Trust in Military Teams is written by defence scientists from the USA, Canada, Australia and the UK, under the auspices of The Transfer Cooperation Programme. It is representative of the latest thinking on trust in teams, and is written for defence researchers, postgraduate students, academics and practitioners in the human factors community.

Trust in Virtual Teams: Organization, Strategies and Assurance for Successful Projects

by Thomas P. Wise

As projects become more complex and the project teams are more geographically and culturally dispersed, so strong, trusting relationships come to the fore. Trust provides the security that enables project teams to work together effectively, even when they face project-threatening problems and challenges. Because today’s team members work virtually as much by choice as by geographic necessity, business leaders must understand how team relationships such as trust, cross-divisional projects, and how offshore team participation are all positively motivated by a solid quality assurance program. Offering real world solutions, Trust in Virtual Teams provides a clear view of how virtual projects can succeed, and how quality assurance compliments and promotes effective organizational design and project management to build solid trust relationships. Dr Wise combines the latest research in virtual team trust with simple and proven quality methods. He builds upon more than 20 years of experience in quality and project work to guide team managers in creating high performing project teams. Our understanding of the role human factors play in project performance and project resilience continues to grow. As it does, so does our need to address the behaviors and culture that enable good performance. Tom Wise’s book is a thoughtful and pragmatic guide to help project teams and managers do just that.

Trust-Based Communication Systems for Internet of Things Applications

by Sandeep Kautish Anand Sharma Dilip Sharma Prateek Agrawal Vishu Madaan Akshat Agarwal

TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.

Trusted Cellular IoT Devices: Design Ingredients and Concepts (Synthesis Lectures on Engineering, Science, and Technology)

by Kersten Heins

This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.

Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention And Detection

by Hassan Salmani

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Trusted Execution Environments

by Konstantinos Markantonakis Carlton Shepherd

Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow.This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.

Trustworthy AI - Integrating Learning, Optimization and Reasoning: First International Workshop, TAILOR 2020, Virtual Event, September 4–5, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12641)

by Michela Milano Barry O’Sullivan Fredrik Heintz

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on the Foundation of Trustworthy AI - Integrating Learning, Optimization and Reasoning, TAILOR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 11 revised full papers presented together with 6 short papers and 6 position papers were reviewed and selected from 52 submissions. The contributions address various issues for Trustworthiness, Learning, reasoning, and optimization, Deciding and Learning How to Act, AutoAI, and Reasoning and Learning in Social Contexts.

Trustworthy Execution on Mobile Devices

by Amit Vasudevan James Newsome Jonathan M. Mccune

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Trustworthy Hardware Design: Combinational Logic Locking Techniques (Analog Circuits and Signal Processing)

by Muhammad Yasin Jeyavijayan (JV) Rajendran Ozgur Sinanoglu

With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers.

Trustworthy Internet

by Nicola Blefari-Melazzi Giuseppe Bianchi Luca Salgarelli

This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet". The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received by the audience. The book also includes: i) an introduction by the Editors, setting the scene and presenting evolution scenarios; ii) five papers written by the session chairmen, reputed scientists, and each dedicated to a facet of the trustworthy Internet vision; iii) a concluding paper, reporting the outcomes of a panel held at the conclusion of the workshop, written by the two keynote speakers.

Truth Or Lie: Inventors! (Step into Reading)

by Erica S. Perl

Budding inventors and science fair nerds will love hunting down the TRUTH about some groundbreaking inventions--past and present--and the people behind them in this innovative early reader.The computer mouse was invented by Steve Jobs, right? That's a LIE! The TRUTH is, it was invented by a man you've probably never heard of named Doug Englebart!! Though this engaging early reader is 100% fun, 25% of it is FALSE! In a unique Q&A format, proficient readers are quizzed about inventions and their inventors to see if they can separate facts from "lies." The book's mascot--the Truth Sleuth--guides readers through this funny and fact-packed book, which features photos and illustrations of a wide variety of inventions--from the printing press to velcro to a light-up soccer ball. With funny, kid-appealing art by Michael Slack.Step 3 Readers feature easy-to-follow plots about popular topics, for children who are ready to read on their own.

Truth from the Valley: A Practical Primer on Future IT Management Trends

by Mark Settle

Management challenges faced by IT leaders in Silicon Valley will eventually be encountered by IT leaders everywhere. Successful Silicon Valley firms operate in radically different ways when compared with their conventional Fortune 500 counterparts. Valley firms rely almost exclusively on cloud-based business applications and cloud-computing resources to conduct daily business. In addition, they are increasingly relying on artificial intelligence and machine-learning tools to extract business information from vast quantities of data. Valley firms are operating on the leading edge of the changes taking place within the IT industry. In some cases, they are literally defining the leading edge of such changes! Truth from the Valley provides insight into ways in which people, process, and technology management challenges have been addressed by IT leaders in Silicon Valley. This book provides a comprehensive portrayal of the trends that will shape IT management practices in the next decade, and it challenges its readers to find ways of converting these challenges into opportunities that will enable their organizations to become more efficient, more impactful, and more business relevant in the future.

Tryptophan in Animal Nutrition and Human Health

by Yulong Yin Sung Woo Kim Xiongzhuo Tang

This book integrates the research progress of Tryptophan (Trp) and its metabolites in animal nutrition and human health. It recapitulates the effects of Trp nutrition on the regulation of various physiological functions in farmed animals as well as the clinical connections between Trp metabolism and human diseases. Furthermore, this book includes detailed information about the manufacturing process of industrial Trp production and methodologies to study Trp metabolism. This book not only brings numerous benefits to academic communities worldwide but also provides practical values for industrial professionals/companies. Both of these two aspects will expand our understanding of how amino acid metabolism contributes to the maintenance of host health.

Tryptophan: Biochemical and Health Implications (Modern Nutrition)

by Herschel Sidransky

Historically, the amino acid tryptophan has been considered to play a role in cancer development and the aging process. In recent times, this nutrient has been associated with eosinophila myalgia syndrome - a new human disease that attacks the muscular system. This detailed book examines the implications of the large measure of fresh information ga

Tsukemono: Decoding the Art and Science of Japanese Pickling

by Ole G. Mouritsen Klavs Styrbæk

One of the best-kept secrets of Japanese cuisine is a range of side dishes known as tsukemono (つけもの, 漬物). The word, pronounced ‘tskay-moh-noh,’ means ‘something that has been steeped or marinated’ (tsuke—steeped; mono—things). Although tsukemono are usually made from vegetables, some fruits, flowers, and a few rhizomes are also preserved this way; it is, therefore, more accurate to characterize them as ‘pickled foods.’ Their preparation makes use of one or more conservation techniques, involving ingredients such as salt, sugar, vinegar, alcohol, and herbs, in combination with methods including dehydration, marinating in salt and acidic liquids, fermentation, and curing. The process of making tsukemono amounts to more than just a simple way of preserving otherwise perishable fresh produce. Apart from its nutritional value, the dish stimulates the appetite, provides delicious taste sensations, and improves digestion, all while remaining an elegant study in simplicity and esthetic presentation. This book goes well beyond explaining the secrets of making crisp tsukemono. The authors discuss the cultural history and traditions associated with these pickled foods; provide recipes and outline techniques for preparing them at home with local ingredients; describe the healthful benefits and basic nutritional value to be found in the various types of pickles; and show how easy it is to serve them on a daily basis to stimulate the appetite or as condiments to accompany vegetable, fish, and meat dishes. The goal is to encourage the readers of this book to join us in a small culinary adventure that will allow us to expand and diversify our consumption of plant-based foods, which are so vital to our overall well-being. And along the way, there may be a few surprises.

Tu, robot

by Daniel Canals Flores

Tu, robot è un serio avvertimento per l'Umanità. Scrivendo questa storia un brivido mi ha attraversato l'anima: l'acronimo I.A. (Intelligenza Artificiale) corrisponde alle iniziali del genio indiscusso della robotica Isaac Asimov. Che il Maestro ne fosse a conoscenza? Questo libro vuole essere un tributo al suo lavoro ed alla sua inquietante visione futuristica. La quarta rivoluzione industriale e l’egoismo di pochi daranno origine al mostro che finirà per dominare l’Universo e distruggere la specie umana…

Tube: The Invention of Television

by Marshall Jon Fisher David E. Fisher

The colorful, definitive story of the inventors of television, the race for patents, and the vicious courtroom battles for markets. You're on Jeopardy, the category is popular science, and the answer is "In 1927 he transmitted the first image via an all-electronic TV system." If you don't know the question, you're not alone. In the half century since its commercial unveiling, television has become the undisputed master of communications media, revolutionizing the way postwar generations have viewed the world. Yet few know how television was created, who created it, or how it actually works. Tube is a riveting tale of technological and commercial adventure. Here is the story not of one mad scientist working alone in a laboratory but of a group of brilliant minds—iconoclasts with motivations that ranged from the idealistic zeal of invention to pure greed, each keeping an eye on the others in the race for fortune and glory. Here, too, is the progress of an invention—from laboratory prototypes that drew public laughter to the legal warfare for control of what would become an enormous market power. With devilish character sketches, compelling stories, and engaging, accessible scientific explanations, authors David E. Fisher and Marshall Jon Fisher take us through the advent of "living color" and beyond, concluding with a glance to the future of the medium and the impact of recent digital technologies.

Tubercular Drug Delivery Systems: Advances in Treatment of Infectious Diseases

by Yashwant Pathak Ranjita Shegokar

The book targets new advances in areas of treatment and drug delivery sciences for tuberculosis. It covers advances in drug therapy and drug targeting that focus on innovative trend defining technologies and drug delivery platforms in the understanding of host-pathogens relationship for providing better therapy. A wide variety of novel and nano-formulations using promising technologies are being explored to deliver the drug via different administration routes. This book It addresses the gap between new approaches and old treatment modalities and how they are superior in pharmacological performance when tested in in-vitro and in-vivo. Audience from wide range group like from researchers to regulatory bodies can benefit from the compiled information to find out patient needs and current research advances in the field of tuberculosis research..

Tubes: A Journey to the Center of the Internet

by Andrew Blum

“Andrew Blum plunges into the unseen but real ether of the Internet in a journey both compelling and profound….You will never open an email in quite the same way again.”—Tom Vanderbilt, New York Times bestselling author of TrafficWhen your Internet cable leaves your living room, where does it go? Almost everything about our day-to-day lives—and the broader scheme of human culture—can be found on the Internet. But what is it physically? And where is it really? Our mental map of the network is as blank as the map of the ocean that Columbus carried on his first Atlantic voyage. The Internet, its material nuts and bolts, is an unexplored territory. Until now.In Tubes, journalist Andrew Blum goes inside the Internet's physical infrastructure and flips on the lights, revealing an utterly fresh look at the online world we think we know. It is a shockingly tactile realm of unmarked compounds, populated by a special caste of engineer who pieces together our networks by hand; where glass fibers pulse with light and creaky telegraph buildings, tortuously rewired, become communication hubs once again. From the room in Los Angeles where the Internet first flickered to life to the caverns beneath Manhattan where new fiber-optic cable is buried; from the coast of Portugal, where a ten-thousand-mile undersea cable just two thumbs wide connects Europe and Africa, to the wilds of the Pacific Northwest, where Google, Microsoft, and Facebook have built monumental data centers—Blum chronicles the dramatic story of the Internet's development, explains how it all works, and takes the first-ever in-depth look inside its hidden monuments.This is a book about real places on the map: their sounds and smells, their storied pasts, their physical details, and the people who live there. For all the talk of the "placelessness" of our digital age, the Internet is as fixed in real, physical spaces as the railroad or telephone. You can map it and touch it, and you can visit it. Is the Internet in fact "a series of tubes" as Ted Stevens, the late senator from Alaska, once famously described it? How can we know the Internet's possibilities if we don't know its parts?Like Tracy Kidder's classic The Soul of a New Machine or Tom Vanderbilt's recent bestseller Traffic, Tubes combines on-the-ground reporting and lucid explanation into an engaging, mind-bending narrative to help us understand the physical world that underlies our digital lives.

Tubes: A Journey to the Center of the Internet

by Andrew Blum

An engaging, narrative tour behind the scenes of our everyday lives to see the dark beating heart of the Internet itself.We are all connected now. But connected to what, exactly? In Tubes, journalist Andrew Blum takes readers on a fascinating journey to find out.When former Senator Ted Stevens of Alaska famously described the Internet as “a series of tubes,” he seemed hopelessly, foolishly trapped in an old way of knowing the world. But he wasn’t wrong. After all, as Blum writes, the Internet exists: for all the talk of the “placelessness” of our digital age, the Internet is as fixed in real, physical places as any railroad or telephone ever was. It fills enormous buildings, converges in some places and avoids others, and it flows through tubes under ground, up in the air, and under the oceans all over the world. You can map it, you can smell it, and you can even visit it—and that’s just what Blum does in Tubes.From the room in Berkeley where the Internet flickered to life to the busiest streets in Manhattan as new fiber optic cable is laid down; from the coast of Portugal as a 10,000-mile undersea cable just two thumbs’ wide is laid down to connect Europe and West Africa to the wilds of the Pacific Northwest, where Google, Microsoft and Facebook have built monumental data centers—Blum visits them all to chronicle the dramatic story of the Internet’s development, explain how it all works, and capture the spirit of the place/Like Tracy Kidder’s classic The Soul of a New Machine or Tom Vanderbilt’s recent bestseller Traffic, Tubes combines deep reporting and lucid explanation into an engaging quest to understand the everyday world we live in.

Tubular String Characterization in High Temperature High Pressure Oil and Gas Wells (Multiphysics Modeling)

by Jiuping Xu Zezhong Wu

High temperature, high oil pressure, oil and gas well completion testing have always been a technical challenge and basic theoretical research is one of the key factors needed to ensure a successful completion test. The completion test basic theory includes: a stress analysis of the completion string, completion string buckling behavior, and temperature and pressure distribution prediction. The completion string is the main bearing and power transmission component for oil and gas well operations and production, and it is required to take on a combination of loads, which result in completion string deformation. Because of these complex relationships, completion string stress analysis has become increasingly more complicated.This book discusses the characters of tubular strings in HTHP (High Temperature - High Pressure) oil and gas wells. These characters include the mechanical behavior of tubular strings and the temperature and pressure variation of tubular strings in different conditions. Mathematical models are established for different conditions and solution existence and uniqueness of some models is discussed, providing algorithms corresponding to the different models. Numerical experiments are presented to verify the validity of models and the feasibility of algorithms, and the impact of the parameters of models for oil and gas wells is also discussed.This book is written for production and testing engineers to provide them with the tools to deal more effectively with the numerical decisions they have to take and for researchers and technicians in petroleum and gas testing and production engineering. Finally, it is also intended to serve as a reference book for mathematicians, college teachers and students.

Tubular Structures VII: Proceedings of the seventh international symposium, Miskolc, Hungary, 28-30 August 1996

by József Farkas; Károly Jármai

This volume contains 60 papers dealing with research results in the field of tubular structures. The following areas are covered: applications; static and fatigue behaviour of hollow section joints; beam-to-column connections; concrete-filled steel tubes; and optimum design.

Tubular Structures VIII

by Y.S.CHOO; G.J.VAN DER VEGTE

First published in 1998. Looking at the architecture and engineering of tubular structures, and the behaviour of section joints, members and frames under different loads and conditions, this book provides a reference point for both civil and mechanical engineers.

Tubular Structures X: Proceedings of the 10th International Symposium, Madrid, Spain, 18-20 September 2003

by M.A. Jaurrieta, A. Alonso and J.A. Chica

This volume contains the Kurobane lecture and proceedings of the Tenth International Symposium on Tubular Structures - ISTS10, held in Madrid, Spain, 18-20 September 2003. The ISTS10 provides a platform for the presentation and discussion of seventy-three lectures covering themes including: bridges; roofs; design aspects and case studies; static joint behaviour; fatigue; members; beam-column connections; finite element methods; concrete filled tubes; trusses and frames; cast nodes; and behaviour of tubular structures under fire. This book provides a useful reference work for architects, civil and mechanical engineers, designers, manufacturers and contractors involved with tubular structures.

Refine Search

Showing 70,126 through 70,150 of 73,716 results