Cover; Half Title; Series Page; Title Page; Copyright Page; Table of Contents; List of Illustrations; Contributors; Series Editors' Introduction; Preface; PART I: Theory and Context; 1. Sociolinguistic and Linguistic Foundations of Codeswitching Research; Codeswitching as Language Use; Codeswitching as Language Structure; Codeswitching, Mental Grammars, and Linguistic Repertoires; Codeswitching…
This book explores the contours of the code of silence and provides policy recommendations geared toward creating an environment less conducive for police misconduct. It responds to the recent calls for police reform, in the wake of the perceived illegitimacy of police actions and the protection that the code of silence seems to provide to the police officers who violate the official rules. …
Speaking Code begins by invoking the "Hello World" convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software development, in Speaking Code Geoff Cox formulates an argument that aims to undermine the distinc…
"A Bradford book."Since its founding in 1989 by Terrence Sejnowski, Neural Computation has become the leading journal in the field. Foundations of Neural Computations collects, by topic, the most significant papers that have appeared in the journal over the past nine years. The present volume focuses on neural codes and representations, topics of broad interest to neuroscientists and modelers. …
Theoretically significant work on the grammar of codeswitching by the leading researchers in the field. Codeswitching is the alternate use of two or more languages among bilingual interlocutors. It is distinct from borrowing, which involves the phonological and morphological integration of a word from one language into another. Codeswitching involves the mixing of phonologically distinctive …
An exploration of coding that investigates the interplay between computational abstractions and the fundamentally interpretive nature of human experience. The importance of coding in K–12 classrooms has been taken up by both scholars and educators. Voicing Code in STEM offers a new way to think about coding in the classroom—one that goes beyond device-level engagement to consider the int…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
"Examines the relationship between nature and economy by telling two closely connected stories: that of the ocean and its transformation into a regulated, assetized space; and that of the Atlantic cod"--OCLC-licensed vendor bibliographic record.
"Critical Code Studies (CCS) names a set of methodologies for the exploration of computer source code using the hermeneutics of the humanities. Like 10 PRINT CHR$ (205.5 + RND (1)); : GOTO 10, Mark Marino's Critical Code Studies treats code not as merely functional but as a text, one that can be read, and misinterpreted, by non-programmers. As the author notes, code's "meaning is not determined…
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…