Along with text and graphics, images are fast becoming a generic data type for general-purpose computer systems. This poses new problems for the systems designer, who must be able to preprocess digital image data for a wide variety of video and hard copy displays. Digital halftoning, the method by which the illusion of continuous-tone images are created through the arrangement of binary picture…
"Dialogues in Public Art presents a blend of interviews with the people who create and experience public art - from an artist who mounted three bronze sculptures in the South Bronx to the bureaucrat who led the fight to have them removed; from an artist who describes his work as a "cancer" on architecture to a pair of architects who might agree with him; from a artist who formed a coalition to …
Reporting on research in the United States, Europe, and South America, this book discusses such topics as a cost-benefit analysis of additional police hiring, the testing of innovative policy interventions through field experiments, imprisonment and recidivism rates, incentives and disincentives for sports hooliganism and much more.OCLC-licensed vendor bibliographic record.
International Economics (IE) and International Business (IB) are usually treated as two separate disciplines. With the advent of new trade theory the firm was reintroduced in IE and the fields more and more discuss the same topics. This book shows that IE as well as IB could benefit from each other.OCLC-licensed vendor bibliographic record.
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the del…
"Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation -- to put …
Safe spaces, trigger warnings, microaggressions, the disinvitation of speakers, demands to rename campus landmarks—debate over these issues began in lecture halls and on college quads but ended up on op-ed pages in the New York Times and the Wall Street Journal, on cable news, and on social media. Some of these critiques had merit, but others took a series of cheap shots at “crybullies” w…
A single line of code offers a way to understand the cultural context of computing. This book takes a single line of code—the extremely concise BASIC program for the Commodore 64 inscribed in the title—and uses it as a lens through which to consider the phenomenon of creative computing and the way computer programs exist in culture. The authors of this collaboratively written book treat …
A guide to understanding the inner workings and outer limits of technology and why we should never assume that computers always get it right."In Artificial Unintelligence, Meredith Broussard argues that our collective enthusiasm for applying computer technology to every aspect of life has resulted in a tremendous amount of poorly designed systems. We are so eager to do everything digitally--hir…
In the last two decades, people in a growing number of localities in the United States have developed grassroots ecosystem management (GREM) as a means to resolve policy problems affecting their environment, economy, and communities. Ad hoc and voluntary groups of environmentalists, developers, businesspeople, federal and state resource managers, farmers, loggers, local citizens, and those repr…