"From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--OCLC-licensed vendor bibliographic record.
Constraint-Based Grammar Formalisms provides the first rigorous mathematical and computational basis for this important area. Constraint-based theories of grammar and grammar formalisms are becoming an increasingly widespread area of research in computational linguistics. Constraint-Based Grammar Formalisms provides the first rigorous mathematical and computational basis for this important area…
Intended for designers and researchers, Context and Consciousness brings together 13 contributions that apply activity theory to problems of human-computer interaction. Understanding how people actually use computers in their everyday lives is essential to good design and evaluation. This insight necessitates a move out of the laboratory and into the field. The research described in Context and…
The shift in the practice of human-computer interaction (HCI) Design from user-centered to context-based design marks a significant change in focus. With context-based design, designers start not with a preconceived idea of what users should do, but with an understanding of what users actually do. Context-based design focuses on the situation in which the technology will be used -- the activiti…
The transition from sequential to parallel computation is an area of critical concern in today's computer technology, particularly in architecture, programming languages, systems, and artificial intelligence. This book addresses central issues in concurrency, and by producing both a syntactic definition and a denotational model of Hewitt's actor paradigm--a model of computation specifically aim…
A thorough and accessible introduction to a range of key ideas in type systems for programming language.The study of type systems for programming languages now touches many areas of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. This book offers accessible introductions to key id…
"A Bradford book."Available through MITCogNet.There is increasing interest in genetic programming by both researchers and professional software developers. These twenty-two invited contributions show how a wide variety of problems across disciplines can be solved using this new paradigm.There is increasing interest in genetic programming by both researchers and professional software developers.…
Genetic programming, a form of genetic algorithm that evolves programs and program-like executable structures, is a new paradigm for developing reliable, time- and cost-effective applications. The second volume of Advances in Genetic Programming highlights many of the most recent technical advances in this increasingly popular field.Genetic programming, a form of genetic algorithm that evolves …
Coordinating Distributed Objects presents a novel object-oriented methodology to simplify the construction of distributed software systems. The methodology is based on a programming construct, called synchronizer, that allows the coordination of distributed application components to be programmed in a modular fashion and at a high level of abstraction. The methodology offers new insight into th…
"A Bradford book."OCLC-licensed vendor bibliographic record.