"A Bradford book."An analysis of how economic theories can be used to understand disordered and pathological gambling that calls on empirical evidence about behavior and the brain and argues that addictive gambling is the basic form of all addiction.OCLC-licensed vendor bibliographic record.
This collection of short expository, critical and speculative texts offers a field guide to the cultural, political, social and aesthetic impact of software. Experts from a range of disciplines each take a key topic in software and the understanding of software, such as algorithms and logical structures.OCLC-licensed vendor bibliographic record.
Much of the difficulty in creating information technology systems that truly meet people's needs lies in the problem of pinning down system requirements. This book offers a new approach to the requirements challenge, based on modeling and analyzing the relationships among stakeholders. Although the importance of the system-environment relationship has long been recognized in the requirements en…
In this book, Josh Lerner and Mark Schankerman, drawing on a new, large-scale database, show that open source and proprietary software interact in sometimes unexpected ways, and discuss the policy implications of these findings.OCLC-licensed vendor bibliographic record.
Wendy Hui Kyong Chun argues that cycles of obsolescence & renewal result in part from the ways in which new media encapsulates a logic of programmability. In seeking to embody a future based on past data, new media becomes a metaphor for metaphor itself.OCLC-licensed vendor bibliographic record.
"A Bradford book.""This book explores a central issue in artificial intelligence, cognitive science, and artificial life: how to design information structures and processes that create and adapt intelligent agents through evolution and learning." "The book is organized around four topics: the power of evolution to determine effective solutions to complex tasks, mechanisms to make evolutionary d…
A comprehensive account of the decades-long, multiple antitrust actions against Microsoft and an assessment of the effectiveness of antitrust law in the digital age.OCLC-licensed vendor bibliographic record.
"When an application is built, an underlying data model is chosen to make that application effective. Frequently, other applications need the same data, only modeled differently. The solution of copying the underlying data and modeling is costly in terms of storage and makes data maintenance and evolution impossible. View mechanisms are a technique to model data differently for various applicat…
One goal of modern computer science is to engineer computer programs that can act as autonomous, rational agents; software that can independently make good decisions about what actions to perform on our behalf and execute those actions. Applications range from small programs that intelligently search the Web buying and selling goods via electronic commerce, to autonomous space probes. This book…
A comprehensive analysis of strategic information warfare waged via digital means as a distinct concern for the United States and its allies. In the "information age," information systems may serve as both weapons and targets. Although the media has paid a good deal of attention to information warfare, most treatments so far are overly broad and without analytical foundations. In this book Greg…