Browse Results

Showing 27,451 through 27,475 of 54,498 results

AI 2041: Ten Visions for Our Future

by Kai-Fu Lee Chen Qiufan

How will AI change our world within twenty years? A pioneering technologist and acclaimed writer team up for a &“dazzling&” (The New York Times) look at the future that &“brims with intriguing insights&” (Financial Times). This edition includes a new foreword by Kai-Fu Lee. A BEST BOOK OF THE YEAR: The Wall Street Journal, The Washington Post, Financial Times Long before the advent of ChatGPT, Kai-Fu Lee and Chen Qiufan understood the enormous potential of artificial intelligence to transform our daily lives. But even as the world wakes up to the power of AI, many of us still fail to grasp the big picture. Chatbots and large language models are only the beginning. In this &“inspired collaboration&” (The Wall Street Journal), Lee and Chen join forces to imagine our world in 2041 and how it will be shaped by AI. In ten gripping, globe-spanning short stories and accompanying commentary, their book introduces readers to an array of eye-opening settings and characters grappling with the new abundance and potential harms of AI technologies like deep learning, mixed reality, robotics, artificial general intelligence, and autonomous weapons.

Pro Objective-C

by Keith Lee

The Objective-C programming language continues to grow in popularity and usage because of the power and ease-of-use of the language itself, along with the numerous features that continue to be added to the platform. If you have a basic knowledge of the language and want to further your expertise, Pro Objective-C is the book for you. Pro Objective-C provides an in-depth, comprehensive guide to the language, its runtime, and key API's. It explains the key concepts of Objective-C in a clear, easy to understand manner, and also provides detailed coverage of its more complex features. In addition, the book includes numerous practical examples--code excerpts and complete applications--that demonstrate how to apply in code what you're learning. The book begins with an exploration of Objective-C's basic features and key language elements. After reviewing the basics, it proceeds with an in-depth examination of the Objective-C dynamic programming features and runtime system. Next the book covers the Foundation Framework, the base layer of APIs that can be used for any Objective-C program. Finally, new and advanced features of Objective-C are introduced and shown how they make the Objective-C language even more powerful and expressive. Each topic is covered thoroughly and is packed with the details you need to develop Objective-C code effectively. The most important features are given in-depth treatment, and each chapter contains numerous examples that demonstrate both the power and the subtlety of Objective-C. Start reading Pro Objective-C and begin developing high-quality, professional apps on the OS X and iOS platforms using the Objective-C programming language! What you'll learn Objective-C fundamentals and key language elements Objective-C runtime system Foundation Framework APIs Objective-C advanced language features Xcode Essentials Debugging with LLDB Who this book is for This book is geared towards intermediate to advanced developers who already have some Objective-C experience and want pro-level coverage of the language, including advanced Objective-C features, recent additions to the language, and practical usage of its core frameworks and APIs. It's also great for those developers not familiar with Objective-C that have done some C programming and also understand object-oriented programming concepts. Table of Contents Getting Started Using Classes Objects and Messaging Memory Management The Preprocessor Expert Section - Using ARC Runtime System Runtime Architecture Expert Section - Using the Runtime APIs Foundation Framework General Purpose Classes Foundation Framework System Services Foundation Framework Specialized Services Foundation Functions and Data Types Expert Section - Error Handling Blocks Objective-C Literals Concurrent Programming Key-Value Programming Appendix A: Language Elements Appendix B: Xcode Xposed! Appendix C: Using LLDB

Foundations of Programming Languages

by Kent D. Lee

This clearly written textbook introduces the reader to the three styles of programming, examining object-oriented/imperative, functional, and logic programming. The focus of the text moves from highly prescriptive languages to very descriptive languages, demonstrating the many and varied ways in which we can think about programming. Designed for interactive learning both inside and outside of the classroom, each programming paradigm is highlighted through the implementation of a non-trivial programming language, demonstrating when each language may be appropriate for a given problem. Features: includes review questions and solved practice exercises, with supplementary code and support files available from an associated website; provides the foundations for understanding how the syntax of a language is formally defined by a grammar; examines assembly language programming using CoCo; introduces C++, Standard ML, and Prolog; describes the development of a type inference system for the language Small.

Foundations of Programming Languages

by Kent D. Lee

This clearly written textbook introduces the reader to the three styles of programming, examining object-oriented/imperative, functional, and logic programming. The focus of the text moves from highly prescriptive languages to very descriptive languages, demonstrating the many and varied ways in which we can think about programming. Designed for interactive learning both inside and outside of the classroom, each programming paradigm is highlighted through the implementation of a non-trivial programming language, demonstrating when each language may be appropriate for a given problem. Features: includes review questions and solved practice exercises, with supplementary code and support files available from an associated website; provides the foundations for understanding how the syntax of a language is formally defined by a grammar; examines assembly language programming using CoCo; introduces C++, Standard ML, and Prolog; describes the development of a type inference system for the language Small.

Python Programming Fundamentals (Undergraduate Topics in Computer Science)

by Kent D. Lee

Computer programming is a skill that can bring great enjoyment from the creativity involved in designing and implementing a solution to a problem. This classroom-tested and easy-to-follow textbook teaches the reader how to program using Python, an accessible language which can be learned incrementally. Through an extensive use of examples and practical exercises, students will learn to recognize and apply abstract patterns in programming, as well as how to inspect the state of a program using a debugger tool. Features: contains numerous examples and solved practice exercises designed for an interactive classroom environment; highlights several patterns which commonly appear in programs, and presents exercises that reinforce recognition and application of these patterns; introduces the use of a debugger, and includes supporting material that reveals how programs work; presents the Tkinter framework for building graphical user interface applications and event-driven programs; provides helpful additional resources for instructors at the associated website: http://cs.luther.edu/~leekent/CS1. This hands-on textbook for active learning in the classroom will enable undergraduates in computer science to develop the necessary skills to begin developing their own programs. It employs Python as the introductory language due to the wealth of support available for programmers.

Data Structures and Algorithms with Python (Undergraduate Topics in Computer Science)

by Kent D. Lee Steve Hubbard

This textbook explains the concepts and techniques required to write programs that can handle large amounts of data efficiently. Project-oriented and classroom-tested, the book presents a number of important algorithms supported by examples that bring meaning to the problems faced by computer programmers. The idea of computational complexity is also introduced, demonstrating what can and cannot be computed efficiently so that the programmer can make informed judgements about the algorithms they use. Features: includes both introductory and advanced data structures and algorithms topics, with suggested chapter sequences for those respective courses provided in the preface; provides learning goals, review questions and programming exercises in each chapter, as well as numerous illustrative examples; offers downloadable programs and supplementary files at an associated website, with instructor materials available from the author; presents a primer on Python for those from a different language background.

Data Structures and Algorithms with Python: With an Introduction to Multiprocessing (Undergraduate Topics in Computer Science)

by Kent D. Lee Steve Hubbard

This textbook explains the concepts and techniques required to write programs that can handle large amounts of data efficiently. Project-oriented and classroom-tested, the book presents a number of important algorithms—supported by motivating examples—that bring meaning to the problems faced by computer programmers. The idea of computational complexity is introduced, demonstrating what can and cannot be computed efficiently at scale, helping programmers make informed judgements about the algorithms they use. The easy-to-read text assumes some basic experience in computer programming and familiarity in an object-oriented language, but not necessarily with Python.Topics and features:Includes introductory and advanced data structures and algorithms topics, with suggested chapter sequences for those respective coursesProvides learning goals, review questions, and programming exercises in each chapter, as well as numerous examplesPresents a primer on Python for those coming from a different language backgroundAdds a new chapter on multiprocessing with Python using the DragonHPC multinode implementation of multiprocessing (includes a tutorial)Reviews the use of hashing in sets and maps, and examines binary search trees, tree traversals, and select graph algorithmsOffers downloadable programs and supplementary files at an associated website to help studentsStudents of computer science will find this clear and concise textbook invaluable for undergraduate courses on data structures and algorithms, at both introductory and advanced levels. The book is also suitable as a refresher guide for computer programmers starting new jobs working with Python.Dr. Kent D. Lee is a Professor Emeritus of Computer Science at Luther College, Decorah, Iowa, USA. He is the author of the successful Springer books, Python Programming Fundamentals, and Foundations of Programming Languages.Dr. Steve Hubbard is a Professor Emeritus of Mathematics and Computer Science at Luther College.

Blockchain – ICBC 2021: 4th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10–14, 2021, Proceedings (Lecture Notes in Computer Science #12991)

by Kisung Lee Liang-Jie Zhang

This book constitutes the proceedings of the 4th International Conference on Blockchain, ICBC 2021, held as part of SCF 2021, held as a Virtual Event, during December 10–14, 2021. The 8 full papers and 1 short paper presented were carefully reviewed and selected from 31 submissions. They deal with all topics regarding blockchain technologies, platforms, solutions and business models, including new blockchain architecture, platform constructions, blockchain development and blockchain services technologies as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.

Annotation-Based Semantics for Space and Time in Language (Studies in Natural Language Processing)

by Kiyong Lee

Space and time representation in language is important in linguistics and cognitive science research, as well as artificial intelligence applications like conversational robots and navigation systems. This book is the first for linguists and computer scientists that shows how to do model-theoretic semantics for temporal or spatial information in natural language, based on annotation structures. The book covers the entire cycle of developing a specification for annotation and the implementation of the model over the appropriate corpus for linguistic annotation. Its representation language is a type-theoretic, first-order logic in shallow semantics. Each interpretation model is delimited by a set of definitions of logical predicates used in semantic representations (e.g., past) or measuring expressions (e.g., counts or k). The counting function is then defined as a set and its cardinality, involving a universal quantification in a model. This definition then delineates a set of admissible models for interpretation.

Digital Creativity

by Kun Chang Lee

As the use of digital technology has grown, so necessarily has the body of research into its effects at the personal, group and organizational levels, but there is no one book that looks at how digital technology has specifically influenced creativity. Digital Creativity: Individuals, Groups, and Organizations discusses all spectrums of influence that digital technologies have on creativity from the individual, team, and organization level. This book offers a new kind of creativity model encompassing all three levels of creativity. It combines each level into a unified creativity framework in which organizations regardless of their industry types could benefit in reengineering their business processes as well as strategies. For this purpose, the book considers various factors that would affect creativity- individuals' digital efficacy, heterogeneity among members (i.e., age, gender, races, tenure, education, and culture, etc), CMC (Computer-Mediated Communication), task complexity, exploitation, exploration, culture, organizational learning capability, and knowledge networks among members. This book introduces a theorized and systematic glimpse into the exciting realm of digital creativity. It is organized with contents starting from individuals to teams and ultimately to organizations, each with various techniques and cases. Each chapter shows how individuals, teams, and organizations can become more creative through use of digital technologies.

Information Security and Cryptology – ICISC 2018: 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11396)

by Kwangsu Lee

This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

IT Development in Korea: A Broadband Nirvana? (Routledge Advances in Korean Studies)

by Kwang-Suk Lee

This book investigates the contextual factors that led to Korean society becoming ‘broadband heaven’ — the most wired nation in the world — by scrutinizing the historical contexts surrounding the Korean Information Infrastructure (KII) project (1995–2005), which aimed to establish a nationwide high-speed backbone network, as well as its later evolution, which involved redesigning the public infrastructure. The book details the hidden mechanisms and the real elements of building the ‘broadband heaven’: the global constraints conditioning its telecom policies, the dense state–capital linkages, and the bureaucratic desire for social control. It draws on the state-in-society approach to analyze the deformations caused by the symbiosis between the state and big business in implementing the rosy vision of the broadband network. This book provides insights into how to formulate future telecom policies along much more democratically participatory lines while restraining the overwhelming power of the telecom oligopolies and conglomerates. It stands alone as a comprehensive study of the recent East Asian model of IT development, written specifically to examine Korea’s socio-historical mechanisms for promoting physical speed and broadband mobility. This book will be important reading to anyone interested in Korean Studies, Information Technology and I.T. Development.

Technology in Education. Innovations for Online Teaching and Learning: 5th International Conference, ICTE 2020, Macau, China, August 19-22, 2020, Revised Selected Papers (Communications in Computer and Information Science #1302)

by Lap-Kei Lee Leong Hou U Fu Lee Wang Simon K. S. Cheung Oliver Au Kam Cheong Li

This book constitutes extended papers from the 5th International Conference on Technology in Education, ICTE 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 30 papers presented in this volume were carefully reviewed and selected from 79 submissions. They are organized in topical sections on instructional technology; learning analysis and assessment; learning environment; open and collaborative learning; technology and education.

Instant Creating Data Models with PowerPivot How-to

by Leo Taehyung Lee

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This is a practical, recipe-based book, taking the reader through the hands-on steps required to set up and use PowerPivot with as little fuss as possible.This is an introductory book on PowerPivot for basic Excel users who handle lots of data and are willing to go beyond the limitations of Excel without the need to learn a new language from scratch.

How to Grow a Robot: Developing Human-Friendly, Social AI

by Mark H. Lee

How to develop robots that will be more like humans and less like computers, more social than machine-like, and more playful and less programmed.Most robots are not very friendly. They vacuum the rug, mow the lawn, dispose of bombs, even perform surgery—but they aren't good conversationalists. It's difficult to make eye contact. If the future promises more human-robot collaboration in both work and play, wouldn't it be better if the robots were less mechanical and more social? In How to Grow a Robot, Mark Lee explores how robots can be more human-like, friendly, and engaging.Developments in artificial intelligence—notably Deep Learning—are widely seen as the foundation on which our robot future will be built. These advances have already brought us self-driving cars and chess match–winning algorithms. But, Lee writes, we need robots that are perceptive, animated, and responsive—more like humans and less like computers, more social than machine-like, and more playful and less programmed. The way to achieve this, he argues, is to “grow” a robot so that it learns from experience—just as infants do. After describing “what's wrong with artificial intelligence” (one key shortcoming: it's not embodied), Lee presents a different approach to building human-like robots: developmental robotics, inspired by developmental psychology and its accounts of early infant behavior. He describes his own experiments with the iCub humanoid robot and its development from newborn helplessness to ability levels equal to a nine-month-old, explaining how the iCub learns from its own experiences. AI robots are designed to know humans as objects; developmental robots will learn empathy. Developmental robots, with an internal model of “self,” will be better interactive partners with humans. That is the kind of future technology we should work toward.

Cyber Threat Intelligence

by Martin Lee

CYBER THREAT INTELLIGENCE “Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn’t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when you know.” —Simon Edwards, Security Testing Expert, CEO SE Labs Ltd., Chair AMTSO Effective introduction to cyber threat intelligence, supplemented with detailed case studies and after action reports of intelligence on real attacks Cyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view. The author takes a systematic, system-agnostic, and holistic view to generating, collecting, and applying threat intelligence. The text covers the threat environment, malicious attacks, collecting, generating, and applying intelligence and attribution, as well as legal and ethical considerations. It ensures readers know what to look out for when considering a potential cyber attack and imparts how to prevent attacks early on, explaining how threat actors can exploit a system’s vulnerabilities. It also includes analysis of large scale attacks such as WannaCry, NotPetya, Solar Winds, VPNFilter, and the Target breach, looking at the real intelligence that was available before and after the attack. Topics covered in Cyber Threat Intelligence include: The constant change of the threat environment as capabilities, intent, opportunities, and defenses change and evolve Different business models of threat actors, and how these dictate the choice of victims and the nature of their attacks Planning and executing a threat intelligence programme to improve an organistation’s cyber security posture Techniques for attributing attacks and holding perpetrators to account for their actions Cyber Threat Intelligence describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, particularly if they wish to develop a career in intelligence, and as a reference for those already working in the area.

Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data

by Micah Lee

Data-science investigations have brought journalism into the 21st century, and—guided by The Intercept&’s infosec expert Micah Lee— this book is your blueprint for uncovering hidden secrets in hacked datasets.Unlock the internet&’s treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism.Dive into exposed datasets from a wide array of sources: the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee&’s own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research.Gain practical skills in searching massive troves of data for keywords like &“antifa&” and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files.You will also learn how to:Master encrypted messaging to safely communicate with whistleblowers.Secure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop.Harvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies.Probe leaked email archives about offshore detention centers and the Heritage Foundation.Analyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network.We live in an age where hacking and whistleblowing can unearth secrets that alter history. Hacks, Leaks, and Revelations is your toolkit for uncovering new stories and hidden truths. Crack open your laptop, plug in a hard drive, and get ready to change history.

Alphabet: The Becoming of Google (Global Media Giants)

by Micky Lee

Google is synonymous with searching, but in this innovative new research volume, Micky Lee explores how the Alphabet Corporation, now the parent company of Google, is more than just a search engine. Using a political economic approach, Lee draws on the concept of networks to investigate the growth of this key media player. The establishment of the parent company, Alphabet, shows the company is expanding to other industries from equity investment to self-driving cars. This book first examines this history of expansion, before delving into the economic, political, and cultural profiles of the corporation. Lee ultimately finds that what makes Google powerful is not one genius idea, but rather networks of people, places, and capital. Alphabet: The Becoming of Google is a compelling dive into the sometimes inscrutable world of Google, ideal for students, scholars, and researchers interested in the fields of digital media studies, the politics and economies of online media, and the history of the internet.

Understanding the Business of Global Media in the Digital Age

by Micky Lee Dal Yong Jin

This new introductory textbook provides students with the tools they need to understand the way digital technologies have transformed the global media business of the 21st century. Focusing on three main approaches – media economics, critical political economy, and production studies – the authors provide an empirically rich analysis of ownership, organizational structures and culture, business strategies, markets, networks of strategic alliances, and state policies as they relate to global media. Examples throughout involve both traditional and digital media and are taken from different regions and countries to illustrate how the media business is influenced by interconnected historical, political, economic, and social factors. In addition to introducing today’s convergent world of global media, the book gives readers a greater understanding of their own potential roles within the global media industries.

Neural Information Processing: 28th International Conference, ICONIP 2021, Sanur, Bali, Indonesia, December 8–12, 2021, Proceedings, Part VI (Communications in Computer and Information Science #1517)

by Minho Lee Kok Wai Wong Teddy Mantoro Media Anugerah Ayu Achmad Nizar Hidayanto

The two-volume set CCIS 1516 and 1517 constitutes thoroughly refereed short papers presented at the 28th International Conference on Neural Information Processing, ICONIP 2021, held in Sanur, Bali, Indonesia, in December 2021.* The volume also presents papers from the workshop on Artificial Intelligence and Cyber Security, held during the ICONIP 2021. The 176 short and workshop papers presented in this volume were carefully reviewed and selected for publication out of 1093 submissions. The papers are organized in topical sections as follows: theory and algorithms; AI and cybersecurity; cognitive neurosciences; human centred computing; advances in deep and shallow machine learning algorithms for biomedical data and imaging; reliable, robust, and secure machine learning algorithms; theory and applications of natural computing paradigms; applications.* The conference was held virtually due to the COVID-19 pandemic.

Conceptual Modeling: 37th International Conference, Er 2018, Xi'an, China, October 22-25, 2018, Proceedings (Lecture Notes in Computer Science #11157)

by Mong Li Lee Guoliang Li Tok Wang Ling Zhanhuai Li Xiaoyong Du Karen C. Davis Juan C. Trujillo

This book constitutes the refereed proceedings of the 37th International Conference on Conceptual Modeling, ER 2018, held in XI'an, China, in October 2018.The 30 full and 13 short papers presented together with 3 keynotes were carefully reviewed and selected from 151 submissions.This events covers a wide range of following topics: Conceptual modeling studies, ontological modeling, semi-structured data modeling, process modeling and management, spatio-temporal modeling, cloud-based modeling, schema and view modeling,languages and models, NoSQL modeling, conceptual modeling for machine learning and reasoning, applications of conceptual modeling.

Success in Graduate School and Beyond: A Guide for STEM Students and Postdoctoral Fellows

by Nana Lee Reinhart Reithmeier

Success in Graduate School and Beyond is designed to empower graduate students and postdoctoral fellows in STEM with practical tools, tips, and skill development strategies to plan and create their dream career pathway. Intended as a professional development course book, this balanced, self-reflective guide to workplace readiness is organized into five sections that support graduate student development: self-reflection, wellness, skills, networking, and planning for future success. Written in a conversational style, this guidebook includes clear learning outcomes based on the authors’ successful graduate professional development course at the University of Toronto. Covering increasingly important career subjects such as mentorships, transferrable skill development, emotional intelligence, and EDI, this guidebook solves a skills gap and builds core competencies demanded from industries and academia. Interspersed personal accounts from the authors about key topics and seven Alumni Career Profiles describing various career trajectories work to encourage self-awareness and promote essential skill development and networking proficiency. With this book, STEM students will be equipped with the abilities and tools to achieve success in graduate school and beyond.

Policymaking for Citizen Behavior Change: A Social Marketing Approach

by Nancy R. Lee

Social marketing is a discipline unfamiliar to many policymakers, often confused with the more frequently applied and studied fields of social media, behavioral economics, or social change. Social marketing is a growing field and methodology, however, that has been successfully applied to improve public health, prevent injuries, protect the environment, engage communities, and improve financial well-being. Policymaking for Citizen Behavior Change is designed to demonstrate the ways in which social marketing can be an effective and efficient tool to change citizens’ behavior, and how to advocate for and support its appropriate application. Providing a 10-Step Planning Model and examining a variety of social marketing cases and tools, including more than 40 success stories, Policymaking for Citizen Behavior Change is core reading for current policymakers, as well as all those studying and practicing social marketing, particularly in the public sector. It’s also worthwhile supplementary reading for those studying public policy, public administration, environmental justice, public health, and other programs on how to effect social change.

Counterterrorism and Cybersecurity: Total Information Awareness

by Newton Lee

Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO's Supreme Allied Commander James Stavridis: "Instead of building walls to create security, we need to build bridges." The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: "If you control the code, you control the world." Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that "our problems are manmade -- therefore they can be solved by man [or woman]," as President John F. Kennedy said at the American University commencement in June 1963.

Encyclopedia of Computer Graphics and Games

by Newton Lee

Encyclopedia of Computer Graphics and Games (ECGG) is a unique reference resource tailored to meet the needs of research and applications for industry professionals and academic communities worldwide. The ECGG covers the history, technologies, and trends of computer graphics and games.EditorNewton Lee, Institute for Education, Research, and Scholarships, Los Angeles, CA, USA Academic Co-ChairsShlomo Dubnov, Department of Music and Computer Science and Engineering, University of California San Diego, San Diego, CA, USAPatrick C. K. Hung, University of Ontario Institute of Technology, Oshawa, ON, CanadaJaci Lee Lederman, Vincennes University, Vincennes, IN, USAIndustry Co-ChairsShuichi Kurabayashi, Cygames, Inc. & Keio University, Kanagawa, JapanXiaomao Wu, Gritworld GmbH, Frankfurt am Main, Hessen, Germany Editorial Board MembersLeigh Achterbosch, School of Science, Engineering, IT and Physical Sciences, Federation University Australia Mt Helen, Ballarat, VIC, AustraliaRamazan S. Aygun, Department of Computer Science, Kennesaw State University, Marietta, GA, USABarbaros Bostan, BUG Game Lab, Bahçeşehir University (BAU), Istanbul, TurkeyAnthony L. Brooks, Aalborg University, Aalborg, DenmarkGuven Catak, BUG Game Lab, Bahçeşehir University (BAU), Istanbul, TurkeyAlvin Kok Chuen Chan, Cambridge Corporate University, Lucerne, SwitzerlandAnirban Chowdhury, Department of User Experience and Interaction Design, School of Design (SoD), University of Petroleum and Energy Studies (UPES), Dehradun, Uttarakhand, IndiaSaverio Debernardis, Dipartimento di Meccanica, Matematica e Management, Politecnico di Bari, Bari, ItalyAbdennour El Rhalibi, Liverpool John Moores University, Liverpool, UKStefano Ferretti, Department of Computer Science and Engineering, University of Bologna, Bologna, ItalyHan Hu, School of Information and Electronics, Beijing Institute of Technology, Beijing, ChinaMs. Susan Johnston, Select Services Films Inc., Los Angeles, CA, USAChris Joslin, Carleton University, Ottawa, CanadaSicilia Ferreira Judice, Department of Computer Science, University of Calgary, Calgary, CanadaHoshang Kolivand, Department Computer Science, Faculty of Engineering and Technology, Liverpool John Moores University, Liverpool, UKDario Maggiorini, Department of Computer Science, University of Milan, Milan, ItalyTim McGraw, Purdue University, West Lafayette, IN, USAGeorge Papagiannakis, ORamaVR S.A., Heraklion, Greece; FORTH-ICS, Heraklion Greece University of Crete, Heraklion, GreeceFlorian Richoux, Nantes Atlantic Computer Science Laboratory (LINA), Université de Nantes, Nantes, FranceAndrea Sanna, Dipartimento di Automatica e Informatica, Politecnico di Torino, Turin, ItalyYann Savoye, Institut fur Informatik, Innsbruck University, Innsbruck, AustriaSercan Şengün, Wonsook Kim School of Art, Illinois State University, Normal, IL, USARuck Thawonmas, Ritsumeikan University, Shiga, JapanVinesh Thiruchelvam, Asia Pacific University of Technology & Innovation, Kuala Lumpur, MalaysiaRojin Vishkaie, Amazon, Seattle, WA, USADuncan A. H. Williams, Digital Creativity Labs, Department of Computer Science, University of York, York, UKSai-Keung Wong, National Chiao Tung University, Hsinchu, TaiwanEditorial Board InternSa

Refine Search

Showing 27,451 through 27,475 of 54,498 results