How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconne…
This collection of original essays reflects the breadth of current research in computer science.This collection of original essays reflects the breadth of current research in computer science. Robin Milner, a major figure in the field, has made many fundamental contributions, particularly in theoretical computer science, the theory of programming languages, and functional programming languages.…
The job of the constraint programmer is to use mathematical constraints to model real world constraints and objects. In this book, Kim Marriott and Peter Stuckey provide the first comprehensive introduction to the discipline of constraint programming and, in particular, constraint logic programming. The book covers the necessary background material from artificial intelligence, logic programmin…
This guide illustrates typical ZPL usage and explains in an intuitive manner how the constructs work. The emphasis is on teaching the reader to be a ZPL programmer. Scientific computations are used as examples throughout.OCLC-licensed vendor bibliographic record.
Includes index.The manual describes LISP, a formal mathematical language. LISP differs from most programming languages in three important ways. The first way is in the nature of the data.The LISP language is designed primarily for symbolic data processing used for symbolic calculations in differential and integral calculus, electrical circuit theory, mathematical logic, game playing, and other …
"A Bradford book."OCLC-licensed vendor bibliographic record.
A theory of HCI that uses concepts from semiotics and computer science to focus on the communication between designers and users during interaction.In The Semiotic Engineering of Human-Computer Interaction, Clarisse Sieckenius de Souza proposes an account of HCI that draws on concepts from semiotics and computer science to investigate the relationship between user and designer. Semiotics is the…
OCLC-licensed vendor bibliographic record.
In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she writes, "catalyzes changes not only in what we do but in how we think." Fir…
The notion that "thinking about computing is one of the most exciting things the human mind can do" sets both The Little Schemer (formerly known as The Little LISPer ) and its new companion volume, The Seasoned Schemer , apart from other books on LISP. The authors' enthusiasm for their subject is compelling as they present abstract concepts in a humorous and easy-to-grasp fashion. Together, the…