"The Microelectronics Revolution is a comprehensive guide to the silicon chip revolution and its impact on society. The distinguished contributors to this volume explain in turn the origins and nature of microelectronics, the characteristics of the burgeoning microchip industry and the increasing use of microprocessors in everyday products.The book details the impact of this new technology on s…
"In Mind and Mechanism, Drew McDermott takes a computational approach to the mind-body problem (how it is that a purely physical entity, the brain, can have experiences). He begins by demonstrating the falseness of dualist approaches, which separate the physical and mental realms. He then surveys what has been accomplished in artificial intelligence, clearly differentiating what we know how to …
Includes index.An accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and other topics for the general reader.OCLC-licensed vendor bibliographic record.
A hands-on approach to tasks and techniques in data stream mining and real-time analytics, with examples in MOA, a popular freely available open-source software framework.OCLC-licensed vendor bibliographic record.
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
The world of Twitterbots, from botdom's greatest hits to bot construction to the place of the bot in the social media universe.OCLC-licensed vendor bibliographic record.
The goal of structured prediction is to build machine learning models that predict relational information that itself has structure, such as being composed of multiple interrelated parts. These models, which reflect prior knowledge, task-specific relations, and constraints, are used in fields including computer vision, speech recognition, natural language processing, and computational biology. …
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
"Coyne examines urban living through the frame of cryptography, diving into the technologies, instruments, and processes of hiding information, messages, things, spaces, places, and people within cities"--OCLC-licensed vendor bibliographic record.
An insightful investigation into the mechanisms underlying the predictive functions of neural networks--and their ability to chart a new path for AI. Prediction is a cognitive advantage like few others, inherently linked to our ability to survive and thrive. Our brains are awash in signals that embody prediction. Can we extend this capability more explicitly into synthetic neural networks to im…