Literacy learning continues to be central to schooling, and is currently of major concern to educators, policy developers, and members of the public alike. However, the proliferation of communication channels in this digital era requires a fundamental re-thinking of the nature of literacy and the pedagogy of literacy teaching and teacher education. This text brings together papers by experts in…
Single Stream Networks -- Background -- The Negative Feedback Network -- Peer-Inhibitory Neurons -- Multiple Cause Data -- Exploratory Data Analysis -- Topology Preserving Maps -- Maximum Likelihood Hebbian Learning -- Dual Stream Networks -- Two Neural Networks for Canonical Correlation Analysis -- Alternative Derivations of CCA Networks -- Kernel and Nonlinear Correlations -- Exploratory Corr…
The Specification, Architectures and Tools -- An Introduction to Learning Design -- The Learning Design Specification -- Architectures to Support Authoring and Content Management with Learning Design -- An Architecture for the Delivery of E-learning Courses -- An Architecture for Learning Design Engines -- A Reference Implementation of a Learning Design Engine -- Learning Design Tools -- Design…
Fair Exchange -- An Evenhanded Certified Email System for Contract Signing -- Efficient ID-Based Optimistic Fair Exchange with Provable Security -- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol -- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme…
Plenary Lectures -- Supersonic and Hypersonic Aerodynamics -- Experimental Facilities and Diagnostics -- Shock Reflection, Refraction and Focussing -- Chemical Kinetics and Chemical Mechanisms -- Shock/Boundary Layer and Shock/Votex Interactions -- Biological and Medical Applications -- Detonation Phenomena and Pulse Detonation Devices -- Supersonic Combustion and Scramjets -- Blast Waves and E…
Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
1.Introduction -- 2.Peace and Security in Northern Uganda -- 3.Transnational Organized Crime and Structural Violence in Brazil -- 4.The Multi-Level Dimensions of Peace: The New Macro Regionalism in Europe -- 5.Mental Health, Trajectories and Quality of Life: A Proposal for New Understandings of DDR Processes in Colombia -- 6.Demobilization, Rehabilitation and Reintegration in the Ivory Coast --…
Chapter 1: An Introduction to Migration and Transnationalism between Switzerland and Bulgaria (Marina Richter, Paolo Ruspini) -- Chapter 2: Determinants of Migration and Types of Migration and Mobility (Vesselin Mintchev, Venelin Boshnakov, Marina Richter, Paolo Ruspini) -- Chapter 3: Linking Social Inequalities and Migration (Dotcho Mihailov and Michael Nollert) -- Chapter 4: Assessing Regiona…
ReThinking Management and Cultural Turns -- Culture and Creativity -- Applications and Activities. .This book assembles multi-disciplinary contributions to delve deeper into ReThinking Management. The first part provides some foundational considerations and inspirations. Further chapters offer more specific links to the arts and creativity sectors as well as empirical research and case reflecti…