The essays in this book look at the question of whether physics can be based on information, or – as John Wheeler phrased it – whether we can get “It from Bit”. They are based on the prize-winning essays submitted to the FQXi essay competition of the same name, which drew over 180 entries. The eighteen contributions address topics as diverse as quantum foundations, entropy conservation…
This introductory textbook for business statistics teaches statistical analysis and research methods via business case studies and financial data using Excel, Minitab, and SAS. Every chapter in this textbook engages the reader with data of individual stock, stock indices, options, and futures. One studies and uses statistics to learn how to study, analyze, and understand a data set of partic…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
Presenting a comprehensive resource for the mastery of network analysis in R, the goal of Network Analysis with R is to introduce modern network analysis techniques in R to social, physical, and health scientists. The mathematical foundations of network analysis are emphasized in an accessible way and readers are guided through the basic steps of network studies: network conceptualization, data…
This book introduces the quantum mechanical framework to information retrieval scientists seeking a new perspective on foundational problems. As such, it concentrates on the main notions of the quantum mechanical framework and describes an innovative range of concepts and tools for modeling information representation and retrieval processes. The book is divided into four chapters. Chapter 1 …
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and …
In this 100-page book, you will find that Stripes provides a very simple learning path, where you do not need to understand the entire framework in order to use it. The concept of this book is exactly that – to get you using the framework and writing code immediately. You will be off and running in no time, and adding to your skill set as we progress. This book is written with exactly that…
Electricity is all around us: cars, telephones, computers, lights -- the modern world runs entirely on electrons. But what are electrons? How do they behave? How do we control them? This book will show you how to build a battery, detect static electricity and construct a basic current meter, all using common items from your kitchen. Along the way you'll learn about the meaning of "voltage" and …
This book constitutes the refereed proceedings of the 14th International Conference on Entertainment Computing, ICEC 2015, held in Trondheim, Norway, in September/October 2015. The 26 full papers, 6 short papers, 16 posters, 6 demos and 6 workshops/tutorial descriptions presented were carefully reviewed and selected from 106 submissions. The multidisciplinary nature of Entertainment Computin…
This book presents theories and the main useful techniques of the Finite Element Method (FEM), with an introduction to FEM and many case studies of its use in engineering practice. It supports engineers and students to solve primarily linear problems in mechanical engineering, with a main focus on static and dynamic structural problems. Readers of this text are encouraged to discover the pro…