"Ben Shneiderman's book dramatically raises computer users' expectations of what they should get from technology. He opens their eyes to new possibilities and invites them to think freshly about future technology. He challenges developers to build products that better support human needs and that are usable at any bandwidth. Shneiderman proposes Leonardo da Vinci as an inspirational muse for th…
A comprehensive presentation of the techniques and aesthetics of composition with sound particles.OCLC-licensed vendor bibliographic record.
"The Microelectronics Revolution is a comprehensive guide to the silicon chip revolution and its impact on society. The distinguished contributors to this volume explain in turn the origins and nature of microelectronics, the characteristics of the burgeoning microchip industry and the increasing use of microprocessors in everyday products.The book details the impact of this new technology on s…
"In recent years, many approximate methods have been developed for analyzing queueing models of complex computer systems. These ad hoc methods usually focus on specific aspects of system operation, and appear to be different from one another, making it difficult to see the underlying principles of model development, to understand the relationship between different models of the same system, or …
Written by the team that developed the software, this tutorial is the definitive resource for scientists, engineers, and other computer users who want to use PVM to increase the flexibility and power of their high-performance computing resources.Written by the team that developed the software, this tutorial is the definitive resource for scientists, engineers, and other computer users who want …
"A Bradford book."Presents a spectrum of current research in pulsed neural networks and includes work from some of the key scientists in the field.OCLC-licensed vendor bibliographic record.
How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconne…
This collection of original essays reflects the breadth of current research in computer science.This collection of original essays reflects the breadth of current research in computer science. Robin Milner, a major figure in the field, has made many fundamental contributions, particularly in theoretical computer science, the theory of programming languages, and functional programming languages.…
The job of the constraint programmer is to use mathematical constraints to model real world constraints and objects. In this book, Kim Marriott and Peter Stuckey provide the first comprehensive introduction to the discipline of constraint programming and, in particular, constraint logic programming. The book covers the necessary background material from artificial intelligence, logic programmin…
This guide illustrates typical ZPL usage and explains in an intuitive manner how the constructs work. The emphasis is on teaching the reader to be a ZPL programmer. Scientific computations are used as examples throughout.OCLC-licensed vendor bibliographic record.