Pervasive and networked computers have dramatically reduced the cost of collecting and distributing large datasets. In this context, machine learning algorithms that scale poorly could simply become irrelevant. We need learning algorithms that scale linearly with the volume of the data while maintaining enough statistical efficiency to outperform algorithms that simply process a random subset o…
Borders in Cyberspace investigates issues arising from national differences in law, public policy, and social and cultural values in light of the emerging global information infrastructure. The contributions include detailed analyses of some of the most visible issues, including intellectual property, security, privacy, and censorship.OCLC-licensed vendor bibliographic record.
"A Bradford book."OCLC-licensed vendor bibliographic record.
A guide for assessing an organization's data quality practice and a roadmap for implementing a viable data and information quality management program, based on rigorous research and drawing on real-world examples.OCLC-licensed vendor bibliographic record.
"When an application is built, an underlying data model is chosen to make that application effective. Frequently, other applications need the same data, only modeled differently. The solution of copying the underlying data and modeling is costly in terms of storage and makes data maintenance and evolution impossible. View mechanisms are a technique to model data differently for various applicat…
"Computer systems consisting of many machines will be the norm within a few years. However, making a collection of machines appear as a single, coherent system - in which the location of files, servers, programs, or users is invisible to users who do not wish to know - is a very difficult problem. LOCUS, a distributed version of the popular operating system Unix, provides an excellent solution.…
"Ben Shneiderman's book dramatically raises computer users' expectations of what they should get from technology. He opens their eyes to new possibilities and invites them to think freshly about future technology. He challenges developers to build products that better support human needs and that are usable at any bandwidth. Shneiderman proposes Leonardo da Vinci as an inspirational muse for th…
How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconne…
"A Bradford book."OCLC-licensed vendor bibliographic record.
In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she writes, "catalyzes changes not only in what we do but in how we think." Fir…