![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Correction to: Esports in the Asia-Pacific
-
Chapter
Introduction to Esports in the Asia-Pacific
The introduction aims to provide an understanding of the status of the esports phenomenon in countries from the Asia-Pacific region. The chapter presents readers with the main objectives and topics of the book...
-
Chapter
Conclusions to Esports in the Asia–Pacific
The conclusion sums up some of the findings and highlights where Asia and Pacific esports innovate and suggests directions for future studies on esports in the region. It addresses the key theoretical concerns...
-
Chapter and Conference Paper
Soft Prompt Transfer for Zero-Shot and Few-Shot Learning in EHR Understanding
Electronic Health Records (EHRs) are a rich source of information that can be leveraged for various medical applications, such as disease inference, treatment recommendation, and outcome analysis. However, the...
-
Chapter
Benign Trials, Vexing Violations: Reading Humour in Puzzle Games
Benign violation theory (BVT) claims that humour arises when a situation is interpreted as both benign and as a violation at the same time. The theory has been employed primarily in social psychology and not a...
-
Chapter
Virtual Infrastructure Optimisation
The increasing volumes of data being produced, curated and made available by research infrastructures in the environmental science domain require services able to optimise the delivery staging and process of d...
-
Chapter
The ENVRI Reference Model
Advances in automation, communication, sensing and computation enable experimental scientific processes to generate data at increasingly great speeds and volumes. Research infrastructures are devised to take a...
-
Chapter
Semantic Linking of Research Infrastructure Metadata
The use of metadata to characterise scientific datasets, making data easier to discover and use directly by researchers and via various online data services, is one of the primary concerns of research infrastr...
-
Chapter
Semantic and Knowledge Engineering Using ENVRI RM
The ENVRI Reference Model provides architects and engineers with the means to describe the architecture and operational behaviour of environmental and Earth science research infrastructures (RIs) in a standard...
-
Chapter
Data Cataloguing
After a brief reminder on general concepts used in data cataloguing activities, this chapter provides information concerning the architecture and design recommendations for the implementation of catalogue syst...
-
Chapter
Common Challenges and Requirements
Research infrastructures available for researchers in environmental and Earth science are diverse and highly distributed; dedicated research infrastructures exist for atmospheric science, marine science, solid...
-
Chapter
Data Provenance
The provenance of research data is of critical importance to the reproducibility of and trust in scientific results. As research infrastructures provide more amalgamated datasets for researchers and more integ...
-
Chapter and Conference Paper
Develo**, Provisioning and Controlling Time Critical Applications in Cloud
Quality constraints on time critical applications require high-performance supporting infrastructure and sophisticated optimisation mechanisms for develo** and integrating system components. The lack of soft...
-
Chapter
Soils Governance, an Australian Perspective
It is wonderful to be welcoming the first International Yearbook of Soil Law and Policy with this chapter, which looks at soils governance from the perspective of the people who live in Australia. In this chap...
-
Chapter and Conference Paper
Deadline-Aware Deployment for Time Critical Applications in Clouds
Time critical applications are appealing to deploy in clouds due to the elasticity of cloud resources and their on-demand nature. However, support for deploying application components with strict deadlines on ...
-
Chapter and Conference Paper
KBID: Kerberos Bracelet Identification (Short Paper)
The most common method for a user to gain access to a system, service, or resource is to provide a secret, often a password, that verifies her identity and thus authenticates her. Password-based authentication...
-
Chapter
The Impact of Wound Inflammation on Cancer Progression: Studies in Fish and Patients
There is a long history of literature suggesting parallels between wound healing and cancer growth, and similarly, much anecdotal evidence that tissue damage may impact on the growth and progression of cancers...
-
Chapter
Governing the Stem Cell Sector in India
Stem cell treatments offered in Indian clinics have been controversial since they are based on procedures that have yet to be certified by standard research protocols. Proposals for regulating such practices h...
-
Chapter
Effect of Social and Institutional Fragmentation on Collective Action in Peri-Urban Settings
Voluntary collective action is essential to natural resource governance. In peri-urban settings, a complex behavioural and institutional matrix frames such action, and the net balance of incentives and disince...
-
Chapter
Next Generation Rural Natural Resource Governance: A Careful Diagnosis
Achieving “sustainable development” requires the exploitation without diminution of financial capital, manufactured capital, intellectual capital, human capital, social and relationship capital, and (particula...