This book investigates recent policies introduced into Turkey which are designed to reduce state activities and open up the country to international investment and trade. This is done in the context of the UNs Millennium Development Goals continuing to stretch into the distant future amid the ongoing instability of the global financial system and economic pressures on the West. The focus is on …
The Message is Murder analyses the violence bound up in the everyday functions of digital media. At its core is the concept of 'computational capital' - the idea that capitalism itself is a computer, turning qualities into quantities, and that the rise of digital culture and technologies under capitalism should be seen as an extension of capitalism's bloody logic. Engaging with Borges, Turing, …
Attentive Computing
Agricultural input subsidies were a major feature of development policies in rural economies until the 1980s. Continuing rural poverty with low productivity and fertilizer use in smallholder staple crops has led to their resurgence in Africa. These subsidies are, however, controversial with claims of both large food security benefits and unsustainable, inefficient resource use. This book review…
The importance of fairness, validity, and accessibility in assessment is greater than ever as testing expands to include more diverse populations, more complex purposes, and more sophisticated technologies. This book offers a detailed account of fairness in assessment, and illustrates the interplay between assessment and broader changes in education. In 16 chapters written by leading experts, t…
Computational fluid dynamics (CFD) is the main field of computational mechanics that has historically benefited from advances in high-performance computing. High-performance computing involves several techniques to make a simulation efficient and fast, such as distributed memory parallelism, shared memory parallelism, vectorization, memory access optimizations, etc. As an introduction, we prese…
In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question we use the 25 techniques of situational crime prevention to provide a systematic assessme…
This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet. The book is released under a creative commons license. Such an open-source license is motivated by two reasons. The first is that we hope that this will allow…
Environmental Monitoring/Analysis; Agriculture; Plant Sciences; Ecology
brain computer interface; artificial intelligence; computer networks; classification databases; HCI machine learning; signal processing; user interfaces