Academic literature on the topic 'Cyberstar'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberstar.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyberstar"

1

Creed, B. "The cyberstar: digital pleasures and the end of the Unconscious." Screen 41, no. 1 (March 1, 2000): 79–86. http://dx.doi.org/10.1093/screen/41.1.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Többens, Daniel, Kai Neldner, Laura Valle-Rios, and Susan Schorr. "Cation disorder in CZTS materials from anomalous diffraction at KMC-2 (BESSY)." Acta Crystallographica Section A Foundations and Advances 70, a1 (August 5, 2014): C1774. http://dx.doi.org/10.1107/s2053273314082254.

Full text
Abstract:
The compound semiconductor Cu2ZnSnS4 (CZTS) is a promising alternative for absorber layers in thin film solar cells, as it has a nearly ideal band gap of about 1.5 eV, a high absorption coefficient for visible light, and contains only earth abundant and non-toxic elements. Besides chemical composition and phase purity, the efficiency of CZTS thin film solar cells depends strongly on the concentration of Cu- and Zn-antisites and copper vacancies in the kesterite-type structure. However, Cu(I) and Zn(II) are isoelectric and thus cannot be distinguished by conventional X-ray diffraction. In prior work we determined Cu-Zn-distribution successfully from neutron scattering [1]. Here we present experiments utilizing anomalous X-ray diffraction on the K-edges of Cu and Zn. Anomalous scattering coefficients are heavily wavelength-dependent close to the absorption edges of the respective element. This is utilized for contrast enhancement. Usage of multiple wavelengths above, below and between the absorption edges of Cu and Zn ensures significant overdetermination, so that the Cu-, Zn-, and vacancy concentrations can be refined reliably for the independent crystallographic sites. Experiments were conducted at the diffraction end station of the KMC-2 beamline [2] at BESSY (Berlin, Germany). KMC-2 provides X-ray radiation with both very stable energies and intensities. The accessible energy range of 4 – 14 keV is ideally suited for the K-edges of Cu (8979 eV) and Zn (9659 eV). A 6-circle goniometer in psi-geometry allows both powder and grazing incidence diffraction, so that bulk samples and thin films can be measured. The instrument can be equipped with either a scintillation point detector (Cyberstar) or an area detector (Bruker Vantec), allowing to optimize resolution and intensity to the needs of the experiment.
APA, Harvard, Vancouver, ISO, and other styles
3

Dear, Keith. "Review of Cyberstats." MSOR Connections 1, no. 3 (August 2001): 57–60. http://dx.doi.org/10.11120/msor.2001.01030057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Papagiannouli, Christina. "Cyberformance and the Cyberstage." International Journal of the Arts in Society: Annual Review 6, no. 4 (2011): 273–82. http://dx.doi.org/10.18848/1833-1866/cgp/v06i04/36065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (April 2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.

Full text
Abstract:
A recent study (Yin et al., 2010) showed that combining particle swarm optimization (PSO) with the strategies of scatter search (SS) and path relinking (PR) produces a Cyber Swarm Algorithm that creates a more effective form of PSO than methods that do not incorporate such mechanisms. This paper proposes a Complementary Cyber Swarm Algorithm (C/CyberSA) that performs in the same league as the original Cyber Swarm Algorithm but adopts different sets of ideas from the tabu search (TS) and the SS/PR template. The C/CyberSA exploits the guidance information and restriction information produced in the history of swarm search and the manipulation of adaptive memory. Responsive strategies using long term memory and path relinking implementations are proposed that make use of critical events encountered in the search. Experimental results with a large set of challenging test functions show that the C/CyberSA outperforms two recently proposed swarm-based methods by finding more optimal solutions while simultaneously using a smaller number of function evaluations. The C/CyberSA approach further produces improvements comparable to those obtained by the original CyberSA in relation to the Standard PSO 2007 method (Clerc, 2008).
APA, Harvard, Vancouver, ISO, and other styles
6

Billingsley, Luanne. "Cybersmart: Protect the Patient, Protect the Data." Journal of Radiology Nursing 38, no. 4 (December 2019): 261–63. http://dx.doi.org/10.1016/j.jradnu.2019.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Symanzik, Jürgen, and Natascha Vukasinovic. "Comparative Review of ActivStats, CyberStats, and MM*Stat." MSOR Connections 3, no. 1 (February 2003): 37–42. http://dx.doi.org/10.11120/msor.2003.03010037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Whitty, Monica Therese. "Is There a Scam for Everyone? Psychologically Profiling Cyberscam Victims." European Journal on Criminal Policy and Research 26, no. 3 (September 2020): 399–409. http://dx.doi.org/10.1007/s10610-020-09458-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Holliday, Christopher. "Rewriting the stars: Surface tensions and gender troubles in the online media production of digital deepfakes." Convergence: The International Journal of Research into New Media Technologies 27, no. 4 (July 26, 2021): 899–918. http://dx.doi.org/10.1177/13548565211029412.

Full text
Abstract:
This article examines a cross-section of viral Deepfake videos that utilise the recognisable physiognomies of Hollywood film stars to exhibit the representative possibilities of Deepfakes as a sophisticated technology of illusion. Created by a number of online video artists, these convincing ‘mash-ups’ playfully rewrite film history by retrofitting canonical cinema with new star performers, from Jim Carrey in The Shining (Stanley Kubrick, 1980) to Tom Cruise in American Psycho (Mary Harron, 2000). The particular remixing of stardom in these videos can – as this article contends – be situated within the technological imaginary of ‘take two’ cinephilia, and the ‘technological performativity of digitally remastered sounds and images’ in an era of ‘the download, the file swap, [and] the sampling’ (Elsaesser 2005: 36–40). However, these ‘take two’ Deepfake cyberstars further aestheticize an entertaining surface tension between coherency and discontinuity, and in their modularity function as ‘puzzling’ cryptograms written increasingly in digital code. Fully representing the star-as-rhetorical digital asset, Deepfakes therefore make strange contemporary Hollywood’s many digitally mediated performances, while the reskinning of (cisgender white male) stars sharpens the ontology of gender as it is understood through discourses of performativity (Butler 1990; 2004). By identifying Deepfakes as a ‘take two’ undoing, this article frames their implications for the cultural politics of identity; Hollywood discourses of hegemonic masculinity; overlaps with non-normative subjectivities, ‘body narratives’ and ‘second skins’ (Prosser 1998); and how star-centred Deepfakes engage gender itself as a socio-techno phenomenon of fakery that is produced – and reproduced – over time.
APA, Harvard, Vancouver, ISO, and other styles
10

Whitty, Monica T. "Who can spot an online romance scam?" Journal of Financial Crime 26, no. 2 (April 1, 2019): 623–33. http://dx.doi.org/10.1108/jfc-06-2018-0053.

Full text
Abstract:
Purpose This paper aims to examine predictors (personality, belief systems, expertise and response time) of detecting online romance scams. Design/methodology/approach The online study asked 261 participants to rate whether a profile was a scam or a genuine profile. Participants were also asked to complete a personality inventory, belief scales and demographic, descriptive questions. The online study was also designed to measure response time. Findings It was found that those who scored low in romantic beliefs, high in impulsivity, high in consideration of future consequences, had previously spotted a romance scam and took longer response times were more likely to accurately distinguish scams from genuine profiles. Notably, the research also found that it was difficult to detect scams. The research also found that it was important to adapt Whitty’s (2013) “Scammers Persuasive Techniques Model” to include a stage named: “human detection of scam versus genuine profiles”. Originality/value This is the first study, to the author’s knowledge, that examines predictors of human accuracy in detecting romance scams. Dating sites and government e-safety sites might draw upon these findings to help improve human detection and protect users from this financial and psychologically harmful cyberscam.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cyberstar"

1

Bode, Lisa Merle Theatre Film &amp Dance UNSW. "From shadow citizens to teflon stars : cultural responses to the digital actor." Awarded by:University of New South Wales. Theatre, Film and Dance, 2005. http://handle.unsw.edu.au/1959.4/20593.

Full text
Abstract:
This thesis examines an intermittent uncanniness that emerges in cultural responses to new image technologies, most recently in some impressions of the digital actor. The history of image technologies is punctuated by moments of fleeting strangeness: from Maxim Gorky's reading of the cinematographic image in terms of 'cursed grey shadows', to recent renderings of the computer-generated cast of Final Fantasy: The Spirits Within as silicon-skinned mannequins. It is not merely the image's unfamiliar and new aesthetics that render it uncanny. Rather, the image is received within a cultural framework where its perceived strangeness speaks allegorically of what it means to be human at that historical moment. In various ways Walter Benjamin, Anson Rabinbach and N. Katherine Hayles have claimed that the notion and the experience of 'being human' is continuously transformed through processes related to different stages of modernity including rational thought, industrialisation, urbanisation, media and technology. In elaborating this argument, each of the four chapters is organized around the elucidation of a particular motif: 'dummy', 'siren', 'doppelg??nger' and 'resurrection'. These motifs circulate through discourses on different categories of digital actor, from those conceived without physical referents to those that are created as digital likenesses of living or dead celebrities. These cultural responses suggest that even while writers on the digital actor are speculating about the future, they are engaging with ideas about life, death and identity that are very old and very ambivalent.
APA, Harvard, Vancouver, ISO, and other styles
2

Bjørntvedt, Edgar. "Instrumentering av autonomt ubemannet fly: CyberSwan." Thesis, Norwegian University of Science and Technology, Department of Engineering Cybernetics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10369.

Full text
Abstract:

Målet med CyberSwan er å lage en generell plattform for et autonomt ubemannet fly. Gjennom arbeidet som er beskrevet i denne rapporten er det kommet frem til et egnet instrumenteringsplattform for CyberSwan. Med instrumenteringssystemet som er beskrevet, styres flyet i utgangspunktet manuelt, men med en bryter på en manuell modellflyradiosender settes flyet i autonom modus. CyberSwan styrer seg selv så lenge denne bryteren holdes inne. Instrumenteringssystemet er bygget rundt en PC/104 plattform som består av en PC/104 CPU enhet med lagring på et 2.0 GB Compact Flash-kort. Det er utviklet et IO-kort til PC/104 enheten som gjør det mulig å koble til IMU, GPS, pitotrør, mottager for manuell styring og seks servoer til alle rorene og fartsregulator i CyberSwan. Strømforsyningen til instrumenteringssystemet er også lagt på dette IO-kortet. Styringssystemet kjøres på PC/104 enheten under Linux. Det er lagt inn programvare som gjør det mulig å overføre filer og starte opp styressystemet over Ethernet. Det er utviklet en plattform i Simulink hvor CyberSwan sitt styresystem kan legges til. Denne plattformen inneholder blokker som kommuniserer med alle IO-enhetene i CyberSwan. Denne plattformen er godt beskrevet sammen med utviklingsmiljøet som ble brukt på arbeidsstasjonen. CyberSwan sin viktigste målenhet er IMU. IMUen gir tilstrekkelig informasjon til at CyberSwan sitt styresystem kan stabilisere flyet mot en gitt retning. Denne IMUen er testet med gode resultater sammen med utviklet pådragsorgan til servoene under autonom flyvning. Det er funnet frem til en GPS-modul som egner seg i CyberSwan. Modulen er liten og enkel å bruke, og den er integrert i plattformen i Simulink. Det er også funnet frem til en trykksensor som egner seg å bruke i et pitotrør for måling av hastighet. Denne målingen er ikke fullstendig integrert i instrumenteringssystemet, men trykkmåleren er testet og det er laget tilkobling til trykksensoren på IO-kortet. Det er laget en mottaksenhet for seks servosignaler som er integrert i plattformen i Simulink. Når en modellflymottager kobles til disse inngangene, får styresystemet tilgang til servopådragene under manuell styring. Styresystemet vil dermed til en hver tid kjenne servoenes posisjon selv under manuell styring. En komponent på IO-kortet fungerer ikke som forventet slik at en ikke får utnyttet det fulle potensiale IO-kortet har. Komponenten gjør at det ikke er mulig å måle manuelle servosignaler fra mottager under autonom flyvning. Dette er ikke kritisk for å kunne fly autonomt, men gir begrenset loggemuligheter og kompliserer bruken av CyberSwan. Denne enheten bør derfor byttes ut med en annen enheten i et eventuelt oppfølgingsprosjekt. Det gjenstår en del arbeid for å fullføre integreringen av alle målingene i CyberSwan sitt instrumenteringssystem, men grunnlaget er lagt og resultatene viser at de delene som er fullført, fungerer som forventet.

APA, Harvard, Vancouver, ISO, and other styles
3

Høstmark, Jon Bernhard. "Modelling Simulation and Control of Fixed-wing UAV: CyberSwan." Thesis, Norwegian University of Science and Technology, Department of Engineering Cybernetics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9564.

Full text
Abstract:

This report treats modelling, simulation and control of a fixed-wing aircraft, including implementation of a Aircraft Flight Control System (AFCS). The design and construction of a suitable airframe (design og konstruksjon av ubemannet fly for visuell overvåkning) by Jon Bernhard Hsøtmark is continued in this work. This system was designed to be suitable for surveillance purposes, using electrical propulsion and being low cost. Preferable characteristics considering stability and control to ease control, implementation and tuning of controllers were built into the airframe. The work done here confirms that the goal in cite{bib:bernhard} was met, and compleating the autonomous system using feedback regulation.newline The work finished this spring were divided in to three reports. Design and implementation of sensor and computer system for fixed-wing UAV, by Edgar Bjørntvedt Modelling, simulation and control of fixed-wing UAV, Jon Bernhard Høstmark Ground Station and hardware peripherals for fixed-wing UAV, Mikael K. Eriksen Each task was assigned to one person. This report includes the work done with respect to modeling, simulation, control and testflights. The main focus was building a working prototype. In addition to the technical work, the author of this report has ensured that the project stayed on track. The conclusion in the end of the report discuss this further. June 2007 the three subsystems was integrated for flight testing. Video supplied with this work show stable autonomous flight confirming a working AFCS. Having a working system is thought to be of great value for further work. The working system can also be used for verifying the analytical models obtained thought this work. Adding more sensors to the computer system enable further and tighter controllers, such as height control and waypoint navigation. With these features the UAV system should be ready for surveillance purposes in the commercial market.

APA, Harvard, Vancouver, ISO, and other styles
4

Eriksen, Mikael Kristian. "Ground Station and Hardware Peripherals for Fixed-wing UAV: CyberSwan." Thesis, Norwegian University of Science and Technology, Department of Engineering Cybernetics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9611.

Full text
Abstract:

In this master's thesis, a ground station (GS) for the fixed-wing UAV: CyberSwan (CS), has been developed. The CS was designed for surveillance purposes, and two other master's theses deals with the work of making it autonomous (Høstmark (2007) and Bjørntvedt (2007)). Having a GS will make it possible to communicate with the CS in-flight, and present data and video from the CS through communication devices. The GS has been realised using LabVIEW development software from citet{labview}. A CS simulator was also developed in LabVIEW for test purposes. In addition was a Global Position System (GPS) receiver board, and a Radio Frequency (RF) communication board, developed. The GPS receiver was used to position the GS, and used as a source for position correction data. The RF communication board was developed for mounting in the CS and to be connected to its computer system to enable communication with the GS. The GS used a RF demo board for communication. A wireless camera was mounted on the CS for in-flight video surveillance, and a ultrasound ranging device was tested intended to be used in a autonomous landing situation. A hardware in the loop (HIL) test was performed to test the GS's communication capacity. Here the developed CS simulator was used, as the CS computer system was not completed (Bjørntvedt 2007). The test proved it possible to transfer a CS status message at 4 Hz, making the chosen communication device a good choice for the intended purpose.

APA, Harvard, Vancouver, ISO, and other styles
5

Guelf, Fernand Mathias. "Stadtluft macht frei von der Polis zur Cyberstadt ; philosophische Auseinandersetzungen." Frankfurt, M. Berlin Bern Bruxelles New York, NY Oxford Wien Lang, 2007. http://d-nb.info/994101627/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chang, Fang-wei, and 張芳維. "The Evolution Of Three Dimensional CyberScan Measuring Capabilities For Printing Thickness." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/63935626898238592330.

Full text
Abstract:
碩士
義守大學
電子工程學系碩士班
97
The evaluation of a measurement system should include the precision, accuracy and stability to judge the quality of this measuring system and verify the accuracy of this system under the variation of different operators. Recently, because of the promotions of the international quality control standards such as QS9000, ISO9000 and TS16949, the analysis of the variations of a measurement system are investigated by the people who are working in the quality control department. Especially, there are a lot of studies in the area of gauge repeatability and reproducibility (GR&R). Initially, GR&R were used in the technical manuals of the GM company. In 1992, the three biggest automobile manufactories in the USA commonly published the first edition of measurement system analysis (MSA) which is listed as one of the six manuals in QS9000.The third edition of MSA has been published until 2002. The GR&R has been detailed described in the MSA manual. Now there are three investigation and analysis methods of GR&R in industrial and academic groups. The first method using ANOVA analysis techniques, solves the total measurement variations in GR&R by using the expected mean square sums. The second method calculates the total measurement variations in GR&R by using the concepts of average values and total values. The third method uses long table methods to estimate the total measurement variations and P/T value. In this thesis, the precision, accuracy and stability of measuring system are investigated and analyzed. The experimental data are analyzed by using the MSA methods. The characteristics of measuring system are described in Chapter two. The analysis and evaluation criteria for the measurement system are introduced in Chapter three. The experiments design and the results are discussed in Chapter four. The conclusions and suggestions of future works are included in the final chapter.
APA, Harvard, Vancouver, ISO, and other styles
7

Kuczma, Paweł. "Dane z internetu. Rola rafinacji informacji sieciowej w kampaniach wyborczych." Doctoral thesis, 2016. https://depotuw.ceon.pl/handle/item/1634.

Full text
Abstract:
Globalna ilość danych cyfrowych przyrasta bardzo dynamicznie. W 2013 roku na świecie było 4,4 ZB (zettabajtów) danych. Liczba ta co dwa lata ulega podwojeniu i do 2020 osiągnie 44 ZB – dziesięciokrotnie więcej w porównaniu z rokiem 2013 . Natłok danych sprawia, że jesteśmy jako ludzkość często bezradni wobec ich ogromu. Tradycyjne narzędzia ich analizy nie radzą sobie z takim natłokiem. Istnienie olbrzymich ilości danych, zwłaszcza generowanych przez obywateli, skłania ku refleksji na temat cybernetycznego podejścia do formalnego opisu społeczeństw. Brakuje w bieżącej literaturze opracowań i analiz dotyczących wykorzystywania danych w państwie czy w procesach politycznych. Celem pracy jest wykazanie, że dane z internetu, w tym te generowane przez użytkowników, są wiarygodnym źródłem informacji. Hipoteza główna: dane, w tym te, pochodzące z sieci, mogą stanowić wiarygodne źródło informacji w kampaniach wyborczych. Przyjęta hipoteza jest inspirowana teorią Hayeka opisującą mechanizm gromadzenia i przekazywania rozproszonych informacji przez rynek , który te informacje zbiera. Dane są odpowiednikiem takich rozproszonych informacji w rozumieniu Hayeka , które po odpowiedniej analizie – rafinacji – tworzą informacje przydatne w predykcji wyników wyborów. Tym samym mogą być przydatne w podejmowaniu decyzji politycznych. Rozprawa: - porządkuje kwestie terminologiczne związane z web 2.0, mediami społecznościowymi, big data i open data - konstruuje model cyberpaństwa – tworu państwowego opartego na postulowanej w cybernetyce zasadzie sprzężenia zwrotnego wyrażonej otwieraniu, analizie danych i ich wykorzystywaniu w procesie rządzenia - zawiera opis badań, które jako jedne z pierwszych na świecie (jeśli nie pierwsze) potwierdziły użyteczność danych z mediów społecznościowych w celu przewidywania wydarzeń W pracy wykazano, zarówno na gruncie teoretycznym – w wyniku wywodu analizującego literaturę, jak i praktycznym, na podstawie przykładów konkretnych działań opartych o analizę danych, że dane mają praktyczne zastowanie i w wyniku ich przetwarzania powstają wymierne efekty. Mogą więc odgrywać istotną rolę w sferze społecznej, politycznej, czy gospodarczej. Opisana metoda rafinacji realiów z internetu pozwalająca na przewidywanie wyników wyborów, może stanowić fundament dalszych badań nad danymi i możliwościami ich wykorzystania w cyberpaństwie. M.in. przewidywania potrzeb obywateli oraz ich zachowań zwłaszcza w sferze relacji między obywatelem a państwem oraz między samymi obywatelami, a także ostrzegania przed napięciami społecznymi.
The global amount of digital data grows rapidly. In 2013, there was 4.4 ZB (Zettabyte) data in the world. This number doubles every two years and by 2020 will reach 44 ZB - ten times more compared to 2013 . The overflow of data that makes us as humanity often helpless. Traditional tools of analysis can’t cope with such overflow. The existence of large amounts of data, especially generated by citizens, leads to reflection on the cybernetic approach to the formal description of societies. There’s a lack of current studies and analyzes on the use of data in the country or in the political processes. The main objective of the dissertation is to show that data from the Internet, including those generated by users, are a credible source of information. Main dissertation hypothesis: data, including this coming from the internet, can provide a reliable source of information in electoral campaigns. Hypothesis is inspired by Hayek's theory describing the mechanism of efficiently collecting and disseminating information by the market . The data is equivalent to such scattered information in Hayek’s understanding . After proper analysis - refining - make information useful in forecasting election results. Thus can be useful in making political decisions. This dissertation: - organizes the issues of terminology related to web 2.0, social media, big data and open data - constructs a model of cyberstate - solution based on feedback - the principle proposed by the cybernetics expressed by opening, analysing and using data in the process of governance - contains a description of the studies, which were among the first in the world (if not the first) confirming the utility of Social Media to predict events. It has been proven both theoretically - as a result of reasoning from literature analysis - and practically, based on examples of concrete actions based on data analysis that data have practical applications and processing data can bring measurable effects. They therefore can play an important role in the social, political or economic field. The described method of refining internet data allows to predict the election results, can provide a foundation for further research on the data and possibilities of their use in cyberstate. Among others, it can anticipate the needs of citizens and their behavior especially in the sphere of relations between the citizen and the state and among citizens, as well as warning of social tensions.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyberstar"

1

Cyberstorm. New York: Macmillan Books for Young Readers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sauer, John. MissionForce, cyberStorm: The official strategy guide. Rocklin, Calif: Prima Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mooney, Shane. CyberStorm 2, corporate wars: Prima's official strategy guide. Rocklin, Calif: Prima Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Onwubiko, Cyril. Cyber science 2015: Joint and co-located proceedings of the: International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015), International Conference on Social Media, Wearable and Web Analytics (Social Media 2015), International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2015), 8-9 June 2015, London, UK. London: C-MRiC.org, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Munro, Allen H. Cyberstork. Trafford Publishing, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

CyberStorm. PhutureNews Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mather, Matthew. CyberStorm. Blackstone Audio, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Munro, Allen. Cyberstork. SterlingHouse Publisher, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Skurzynski, Gloria. Gefangen im Cyberstorm. Arena, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cyberstrat (French Language). Quebec Livres, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyberstar"

1

Lalioti, Vali, Christophe Garcia, and Frank Hasenbrink. "Meet.Me@Cyberstage: towards Immersive Telepresence." In Eurographics, 90–102. Vienna: Springer Vienna, 1998. http://dx.doi.org/10.1007/978-3-7091-7519-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leruth, Michael F. "Experiments in Cyber-Liminality." In Fred Forest's Utopia. The MIT Press, 2017. http://dx.doi.org/10.7551/mitpress/9780262036498.003.0004.

Full text
Abstract:
Chapter 3 considers Forest’s internet-based art from the mid-1990s through the present, with particular emphasis on ritualistic and festive manifestations of public liminality that take place online or make the internet an integral part of the event, and on more whimsical exercises in parody and the détournement of interfaces reminiscent of his early experiments with print and broadcast media. Works discussed in Chapter 3 includeFrom Casablanca to Locarno: Love Updated by the Internet and Electronic Media (1995),Time-Out (1998), The Techno-Wedding (1999), The Center of the World (1999), Territorial Outings (2001), Meat: The Territory of the Body and the Networked Body (2002), Memory Pictures (2005), The Experimental Research Center of the Territory (2008), The Traders’ Ball (2010), Ego Cyberstar and the Problem of Identity (2010), Ebb and Flow: The Internet Cave (2011), and Sociological Walk with Google Glass (2014). Chapter 3 also explains Forest’s unique position in the acrimonious “Quarrel of Contemporary Art” (Querelle de l’art contemporain) that raged among French intellectuals and in the media in the 1990s and early 2000s and highlights his contributions to France’s annual Internet Festival, which he helped create.
APA, Harvard, Vancouver, ISO, and other styles
3

"Netting the Cybershark." In Borders in Cyberspace. The MIT Press, 1997. http://dx.doi.org/10.7551/mitpress/1648.003.0015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." In Recent Algorithms and Applications in Swarm Intelligence Research, 22–41. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2479-5.ch002.

Full text
Abstract:
A recent study (Yin et al., 2010) showed that combining particle swarm optimization (PSO) with the strategies of scatter search (SS) and path relinking (PR) produces a Cyber Swarm Algorithm that creates a more effective form of PSO than methods that do not incorporate such mechanisms. This paper proposes a Complementary Cyber Swarm Algorithm (C/CyberSA) that performs in the same league as the original Cyber Swarm Algorithm but adopts different sets of ideas from the tabu search (TS) and the SS/PR template. The C/CyberSA exploits the guidance information and restriction information produced in the history of swarm search and the manipulation of adaptive memory. Responsive strategies using long term memory and path relinking implementations are proposed that make use of critical events encountered in the search. Experimental results with a large set of challenging test functions show that the C/CyberSA outperforms two recently proposed swarm-based methods by finding more optimal solutions while simultaneously using a smaller number of function evaluations. The C/CyberSA approach further produces improvements comparable to those obtained by the original CyberSA in relation to the Standard PSO 2007 method (Clerc, 2008).
APA, Harvard, Vancouver, ISO, and other styles
5

Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." In Emerging Research on Swarm Intelligence and Algorithm Optimization, 50–70. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6328-2.ch003.

Full text
Abstract:
A recent study (Yin, et al., 2010) showed that combining Particle Swarm Optimization (PSO) with the strategies of Scatter Search (SS) and Path Relinking (PR) produces a Cyber Swarm Algorithm that creates a more effective form of PSO than methods that do not incorporate such mechanisms. In this chapter, the authors propose a Complementary Cyber Swarm Algorithm (C/CyberSA) that performs in the same league as the original Cyber Swarm Algorithm but adopts different sets of ideas from the Tabu Search (TS) and the SS/PR template. The C/CyberSA exploits the guidance information and restriction information produced in the history of swarm search and the manipulation of adaptive memory. Responsive strategies using long-term memory and path relinking implementations are proposed that make use of critical events encountered in the search. Experimental results with a large set of challenging test functions show that the C/CyberSA outperforms two recently proposed swarm-based methods by finding more optimal solutions while simultaneously using a smaller number of function evaluations. The C/CyberSA approach further produces improvements comparable to those obtained by the original CyberSA in relation to the Standard PSO 2007 method (Clerc, 2008). These findings motivate future investigations of Cyber Swarm methods that combine features of both the original and complementary variants and incorporate additional strategic notions from the SS/PR template as a basis for creating a still more effective form of swarm optimization.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyberstar"

1

Papadopoulos, Christos, Chris Kyriakakis, Alexander Sawchuk, and Xinming He. "CyberSeer." In the 2004 ACM workshop. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029208.1029223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kiddle, Cameron, A. R. Taylor, Jim Cordes, Olivier Eymere, Victoria Kaspi, Dan Pigat, Erik Rosolowsky, Ingrid Stairs, and A. G. Willis. "CyberSKA." In the 2011 ACM workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2110486.2110496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mooney, Stephen C. "The cyberstate." In the 1996 ACM SIGCPR/SIGMIS conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238857.238910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lalioti, Vali, Christophe Garcia, and Frank Hasenbrink. "Virtual meeting in cyberstage." In the ACM symposium. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/293701.293743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"CyberSA 2018 TOC." In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018. http://dx.doi.org/10.1109/cybersa.2018.8551454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"CyberSA 2020 Front Matters." In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2020. http://dx.doi.org/10.1109/cybersa49311.2020.9139608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"CyberSA 2020 Cover Page." In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2020. http://dx.doi.org/10.1109/cybersa49311.2020.9139624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"CyberSA 2018 Invited Keynotes." In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018. http://dx.doi.org/10.1109/cybersa.2018.8551451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"CyberSA 2018 Cover Page." In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018. http://dx.doi.org/10.1109/cybersa.2018.8551465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Masoni, A., M. Carpinelli, G. Fenu, A. Bosin, D. Mura, I. Porceddu, and G. Zanetti. "Cybersar: A lambda grid computing infrastructure for advanced applications." In 2009 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nssmic.2009.5401612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography