This book provides fresh insights into concepts, methods and new research findings on the causes of excessive food price volatility. It also discusses the implications for food security and policy responses to mitigate excessive volatility. The approaches applied by the contributors range from on-the-ground surveys, to panel econometrics and innova...
Ability to use information and communication technologies (ICT) is an imperative for effective participation in today's digital age. Schools worldwide are responding to the need to provide young people with that ability. But how effective are they in this regard? The IEA International Computer and Information Literacy Study (ICILS) responded t...
This book is written by world-recognized experts in the fields of applied superconductivity and superconducting accelerator magnet technologies. It provides a contemporary review and assessment of the experience in research and development of high-field accelerator dipole magnets based on Nb3Sn superconductor over the past five decades. The reader ...
This book offers insights into the development of the ground-breaking Global Code of Conduct for Research in Resource-Poor Settings (GCC) and the San Code of Research Ethics. Using a new, intuitive moral framework predicated on fairness, respect, care and honesty, both codes target ethics dumping - the export of unethical research practices from a ...
This book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It provides solutions for classical profiles such as the sphere, cone or flat cylindrical punch as well as a multitude of other technically relevant shapes, e.g. the truncated cone, the worn sphere, rough profiles, hollow cylinder...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
This volume discusses the effects, models and implications of history teaching in relation to conflict transformation and reconciliation from a social-psychological perspective. Bringing together a mix of established and young researchers and academics, from the fields of psychology, education, and history, the book provides an in-depth exploration...
This book provides a practical and self-contained overview of the Gene Ontology (GO), the leading project to organize biological knowledge on genes and their products across genomic resources. Written for biologists and bioinformaticians, it covers the state-of-the-art of how GO annotations are made, how they are evaluated, and what sort of analyse...
The central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage domain. In the 21st century the world faces epochal changes which affect every part of society, including the arenas in which cultural heritage is made, held, collected, curated, exhibited, or simply exists. The book is a...
This book covers all facets of entity-oriented search—where "search" can be interpreted in the broadest sense of information access—from a unified point of view, and provides a coherent and comprehensive overview of the state of the art. It represents the first synthesis of research in this broad and rapidly developing area. Selected ...
This book identifies and discusses biodiversity's contribution to physical, mental and spiritual health and wellbeing. Furthermore, the book identifies the implications of this relationship for nature conservation, public health, landscape architecture and urban planning – and considers the opportunities of nature-based solutions for climate...
This book considers the potential setup for a future Multilateral Investment Court (MIC). The option of an MIC was first discussed by the EU Commission in 2016 and has since been made an official element of the EU Common Commercial Policy. In 2017, UNCITRAL also decided to discuss the possibility of an MIC, and on 20 March 2018, the Council of the ...
This book analyses the domestic politics of African dominant party regimes, most notably African governments' survival strategies, to explain their variance of opinions and responses towards the reforming policies of the EU. The author discredits the widespread assumption that the growing presence of China in Africa has made the EU's task...
This volume presents new insights on marginality, i.e. the situation of people living on the edge of socio-economic and ecological systems. The marginality concept leads to different development policies. While the prevalence of poverty declined by about 50 percent in the past two decades, any further reduction of poverty will be more difficult, be...
This book investigates European citizenship after Brexit, in light of the functionalist theory of citizenship. No matter its shape, Brexit will impact significantly on what has been labelled as one of the major achievements of EU integration: Citizenship of the Union. For the first time an automatic and collective lapse of status is observed. It is...
This book maps the youth transitions of descendants of migrants from Turkey living in Amsterdam and Strasbourg, through a comparative mixed-methods research design. As such, it is of interest to discussions in youth sociology, social mobility and second-generation research. The book follows transition trajectories of the second-generation, from sch...
Using longitudinal data from the Swiss Household Panel to zoom in on continuity and change in the life course, this book describes how the lives of the Swiss population have changed in terms of health, family circumstances, work, political participation, and migration over the last sixteen years. What are the different trajectories in terms of mobi...
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...
The multiple purposes of nature - livelihood for communities, revenues for states, commodities for companies, and biodiversity for conservationists - have turned environmental governance in Latin America into a highly contested arena. In such a resource-rich region, unequal power relations, conflicting priorities, and trade-offs among multiple goal...
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016.
The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
This book begins with an algorithm - a set of IF...THEN rules used in the development of a new, ethical, video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be grasped by the algorithm in ...
'This is an excellent and engaging resource on delusions. The idea that delusions should not be seen as radically different from other beliefs… is an important challenge to much contemporary thinking and practice. It should be of interest to anyone studying delusional beliefs, and to all those who aim to help people who are troubled by them....
This book discusses several didactic traditions in mathematics education in countries across Europe, including France, the Netherlands, Italy, Germany, the Czech and Slovakian Republics, and the Scandinavian states. It shows that while they all share common features both in the practice of learning and teaching at school and in research and develop...
This book presents a systematic investigation into internationally comparable data gathered in ICILS 2013. It identifies differences in female and male students' use of, perceptions about, and proficiency in using computer technologies. Teachers' use of computers, and their perceptions regarding the benefits of computer use in education, ...
The result of a workshop bringing together an international advisory board of experts in science, satellite technologies, industry innovations, and public policy, this book addresses the current and future roles of satellite Earth observations in solving large-scale environmental problems. The book showcases the results of engaging distinct communi...
This book is open access under a Creative Commons license.This authoritative book presents the ever progressing state of the art in evaluating climate change strategies and action. It builds upon a selection of relevant and practical papers and presentations given at the 2nd International Conference on Evaluating Climate Change and Development held...
This book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains some selected papers from the international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Karlsruhe, October 23-24, 2018. Cyber Physical Systems are characterized by their ability to...
This Topical Survey offers a brief overview of the current state of research on and activities for mathematically gifted students around the world. This is of interest to a broad readership, including educational researchers, research mathematicians, mathematics teachers, teacher educators, curriculum designers, doctoral students, and other stakeho...
Globalization is a powerful force with far reaching impacts on education and education policy. The growth of large scale international surveys of student achievement and the increasing role played by intergovernmental agencies in education means that the influence that globalization exerts on education is likely to increase even further in the futu...
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale validator, and future work. While many innovations in Technology Enhanced Learning (TEL) have emerged over...
It is common for us today to associate the practice of science primarily with the act of seeing—with staring at computer screens, analyzing graphs, and presenting images. We may notice that physicians use stethoscopes to listen for disease, that biologists tune into sound recordings to understand birds, or that engineers have created Geiger telle...
This second volume of ReConFort, published open access, addresses the decisive role of constitutional normativity, and focuses on discourses concerning the legal role of constitutional norms. Taken together with ReConFort I (National Sovereignty), it calls for an innovative reassessment of constitutional history drawing on key categories to convey ...