The contributors bring a wide range of methodologies to bear on the common problem of image-based object recognition. These interconnected essays on three-dimensional visual object recognition present cutting-edge research by some of the most creative neuroscientific, cognitive, and computational scientists in the field. Cassandra Moore and Patrick Cavanagh take a classic demonstration, t…
An examination of how advocates for alternative agriculture confront "science-based" regulation of genetically engineered crops.OCLC-licensed vendor bibliographic record.
This study charts the origins and spread of the systems movement. It describes the major players - including RAND, MITRE, Ramo-Wooldrige (later TRW), and the International Institute of Applied Systems Analysis - and examines applications in a wide variety of military, government, civil, and engineering settings. The book is international in scope, describing the spread of systems thinking in Fr…
"Engineering education in the United States was long regarded as masculine territory. For decades, women who studied or worked in engineering were popularly perceived as oddities, outcasts, unfeminine (or inappropriately feminine in a male world). In Girls Coming to Tech!, Amy Bix tells the story of how women gained entrance to the traditionally male field of engineering in American higher educ…
AnnotationOCLC-licensed vendor bibliographic record.
"Examination of the relationships among conservation, restoration, novel ecosystems, collective trauma, and memorialization as illustrated by the Green Belt between the former East and West Germanies"--OCLC-licensed vendor bibliographic record.
This volume of case studies serves as a guide and reference manual for the application of engineering science fundamentals in the solution of chemical development and process design problems. The introductory chapter describes a set of general principles relevant to the analysis of industrial design problems. An extensive bibliography is presented which provides a valuable theoretical and pract…
"From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--OCLC-licensed vendor bibliographic record.
Title from title screen."The network economy presents itself in the transactions of electronic commerce, finance, business, and communications. The network economy is also a social condition of discontinuity, indefinite limits, and in-between spaces. In Cornucopia Limited, Richard Coyne uses the liminality of design - its uneasy position between creativity and commerce - to explore the network …
Distributed business component computing--the assembling of business components into electronic business processes, which interact via the Internet--caters to a new breed of enterprise systems that are flexible, relatively easy to maintain and upgrade to accommodate new business processes, and relatively simple to integrate with other enterprise systems. Companies with unwieldy, large, and hete…