The goal of structured prediction is to build machine learning models that predict relational information that itself has structure, such as being composed of multiple interrelated parts. These models, which reflect prior knowledge, task-specific relations, and constraints, are used in fields including computer vision, speech recognition, natural language processing, and computational biology. …
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
"Coyne examines urban living through the frame of cryptography, diving into the technologies, instruments, and processes of hiding information, messages, things, spaces, places, and people within cities"--OCLC-licensed vendor bibliographic record.
An insightful investigation into the mechanisms underlying the predictive functions of neural networks--and their ability to chart a new path for AI. Prediction is a cognitive advantage like few others, inherently linked to our ability to survive and thrive. Our brains are awash in signals that embody prediction. Can we extend this capability more explicitly into synthetic neural networks to im…
"An explantion of a knowledge-based system for creating computational agents with human-like language ability"--OCLC-licensed vendor bibliographic record.
A guide to computational thinking education, with a focus on artificial intelligence literacy and the integration of computing and physical objects. Computing has become an essential part of today's primary and secondary school curricula. In recent years, K-12 computer education has shifted from computer science itself to the broader perspective of computational thinking (CT), which is less abo…
"This book sets the agenda for how we think about human activity that arises from embedding manipulated information in our action and embodied cognition"--OCLC-licensed vendor bibliographic record.
"With contributions from both original visionaries and emergent scholars, this volume extends the educational theory of constructionism, including recent movements in coding and making"--OCLC-licensed vendor bibliographic record.
"This book provides a model for teaching computational thinking to middle and high school students across a broad range of school subjects"--OCLC-licensed vendor bibliographic record.
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …