The message from educators, the tech community, and even politicians is clear: everyone should learn to code. To emphasize the universality and importance of computer programming, promoters of coding for everyone often invoke the concept of "literacy," drawing parallels between reading and writing code and reading and writing text. In this book, Annette Vee examines the coding-as-literacy analo…
In Knowledge Machines, Eric Meyer and Ralph Schroeder argue that digital technologies have fundamentally changed research practices in the sciences, social sciences, and humanities. Meyer and Schroeder show that digital tools and data, used collectively and in distributed mode -- which they term e-research -- have transformed not just the consumption of knowledge but also the production of know…
A novel treatment of the capacity for shared attention, joint action, and perceptual common knowledge. In The Shared World, Axel Seemann offers a new treatment of the capacity to perceive, act on, and know about the world together with others. Seemann argues that creatures capable of joint attention stand in a unique perceptual and epistemic relation to their surroundings; they operate in an en…
From the publisher. The global explosion of online activity is steadily transforming the relationship between government and the public. The first wave of change, "e-government," enlisted the Internet to improve management and the delivery of services. More recently, "e-democracy" has aimed to enhance democracy itself using digital information and communication technology. One notable example o…
Sasan Adibi (BS’95, MS’99, MS’05, PhD’10, SMIEEE’11) has a PhD degree in Communication and Information Systems from University of Waterloo, Canada and the recipient of the best PhD thesis award from the IEEE Society. He is currently involved in the research, design, implementation, and application Electronic Health (eHealth) and Mobile Health (mHealth). Sasan’s research publication …
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
This book is a collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2015. It contains twenty-one chapters in the field of Computational Intelligence, which received highly recommended feedback during SAI Conference 2015 review process. During the three-day event 260 scientists, technology developers, young re…
The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes (LDPC), space-time coding, Reed Solomon (RS) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subjec…
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This book is intended for a broad range of readers, i…
Understanding how culture affects the ways we communicate -- how we tell jokes, greet, ask questions, hedge, apologize, compliment, and so much more. We can learn to speak other languages, but do we truly understand what we are saying? How much detail should we offer when someone asks how we are? How close should we stand to our conversational partners? Is an invitation genuine or just pro form…