A guide to understanding the inner workings and outer limits of technology and why we should never assume that computers always get it right."In Artificial Unintelligence, Meredith Broussard argues that our collective enthusiasm for applying computer technology to every aspect of life has resulted in a tremendous amount of poorly designed systems. We are so eager to do everything digitally--hir…
A speculative framework that imagines how we can use education data to promote play, creativity, and social justice over normativity and conformity. Educational analytics tend toward aggregation, asking what a “normative” learner does. In The Left Hand of Data, educational researchers Matthew Berland and Antero Garcia start from a different assumption—that outliers are, and must be tre…
A hands-on approach to tasks and techniques in data stream mining and real-time analytics, with examples in MOA, a popular freely available open-source software framework.OCLC-licensed vendor bibliographic record.
The two-volume set LNCS 9366 and 9367 constitutes the refereed proceedings of the 14th International Semantic Web Conference, ISWC 2015, held in Bethlehem, PA, USA, in October 2015. The International Semantic Web Conference is the premier forum for Semantic Web research, where cutting edge scientific results and technological innovations are presented, where problems and solutions are discus…
This book constitutes the thoroughly refereed post-conference proceedings of the Satellite Events of the 12th European Conference on the Semantic Web, ESWC 2015, held in Portorǒz, Slovenia, in May/June 2015. The volume contains 12 poster and 22 demonstration papers, selected from 50 submissions, as well as 22 best workshop papers selected from 140 papers presented at the 16 workshops that took…
How the complex interplay of academic, commercial, and military interests produced an intense period of scientific discovery and technological innovation in computing during the Cold War.OCLC-licensed vendor bibliographic record.
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
This book constitutes the thoroughly refereed post-proceedings of the satellite events of the 9th International Conference on the Semantic Web, ESWC 2012, held in Heraklion, Crete, Greece, in May 2012. This volume contains 49 full papers and 13 short papers describing the posters and demonstrations. (SUGGESTION/ HELP needed).
How marginalized groups use Twitter to advance counter-narratives, preempt political spin, and build diverse networks of dissent. The power of hashtag activism became clear in 2011, when #IranElection served as an organizing tool for Iranians protesting a disputed election and offered a global audience a front-row seat to a nascent revolution. Since then, activists have used a variety of hashta…
The goal of structured prediction is to build machine learning models that predict relational information that itself has structure, such as being composed of multiple interrelated parts. These models, which reflect prior knowledge, task-specific relations, and constraints, are used in fields including computer vision, speech recognition, natural language processing, and computational biology. …