Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
An exploration of the political qualities of technology design, as seen in projects that span art, computer science, and consumer products.OCLC-licensed vendor bibliographic record.
This book is a collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2015. It contains twenty-one chapters in the field of Computational Intelligence, which received highly recommended feedback during SAI Conference 2015 review process. During the three-day event 260 scientists, technology developers, young re…
A fascinating examination of technological utopianism and its complicated consequences.OCLC-licensed vendor bibliographic record.
The core message of this book is: computer games best realise affective interaction. This book brings together contributions from specialists in affective computing, game studies, game artificial intelligence, user experience research, sensor technology, multi-modal interfaces and psychology that will advance the state-of-the-art in player experience research; affect modelling, induction, and s…
This book covers the basic theory, practical details and advanced research of the implementation of evolutionary methods on physical substrates. Most of the examples are from electronic engineering applications, including transistor-level design and system-level implementation. The authors present an overview of the successes achieved, and the book will act as a point of reference for both acad…
A foundational analysis of the co-evolution of the internet and international relations, examining resultant challenges for individuals, organizations, firms, and states. In our increasingly digital world, data flows define the international landscape as much as the flow of materials and people. How is cyberspace shaping international relations, and how are international relations shaping cyber…
This book clarifies the role and relevance of the body in social interaction and cognition from an embodied cognitive science perspective. Theories of embodied cognition have during the last decades offered a radical shift in explanations of the human mind, from traditional computationalism, to emphasizing the way cognition is shaped by the body and its sensorimotor interaction with the surroun…
This book explores the various categories of speech variation and works to draw a line between linguistic and paralinguistic phenomenon of speech. Paralinguistic contrast is crucial to human speech but has proven to be one of the most difficult tasks in speech systems. In the quest for solutions to speech technology and sciences, this book narrows down the gap between speech technologists and …
Why every child needs to learn to code: the shift from "computational thinking" to computational participation.OCLC-licensed vendor bibliographic record.