Browse Results

Showing 3,676 through 3,700 of 17,279 results

The Crosslinguistic Study of Language Acquisition: Volume 4

by Dan Isaac Slobin

Continuing the tradition of this series, which has become a standard reference work in language acquisition, Volume 4 contains chapters on three additional languages/language groups--Finnish, Greek, and Korean. The chapters are selective, critical reviews rather than exhaustive summaries of the course of development of each language. Authors approach the language in question as a case study in a potential crosslinguistic typology of acquisitional problems, considering those data which contribute to issues of general theoretical concern in developmental psycholinguistics and linguistic theory. Each chapter, therefore, provides the following: * Grammatical Sketch of Language. Brief grammatical sketch of the language or language group, presenting those linguistic facts which are relevant to the developmental analysis. * Sources of Evidence. Summary of basic sources of evidence, characterizing methods of gathering data, and listing key references. * Overall Course of Development. Brief summary of the overall course of development in the language or language group, giving an idea of the general problems posed to the child in acquiring a language of this type, summarizing typical errors, domains of relatively error-free acquisition, and the timing of acquisition--areas of the grammar that show relatively precocious or delayed development in crosslinguistic perspective. * Data. Specific developmental aspects of the language examined in depth, depending on each individual language and available acquisition data. * Conclusions. An interpretive summary of theoretical points raised above, attending to general principles of language development and linguistic organization suggested by the study of a language of this type, plus comparisons with development of other languages.

The Crosslinguistic Study of Language Acquisition: Volume 2: Theoretical Issues

by Dan Isaac Slobin

See Volume I (0-89859-367-0) for full description and TOC.

The Crosslinguistic Study of Language Acquisition: Volume 3

by Dan Isaac Slobin

Extending the tradition of this series, which has become a standard reference work in language acquisition, this volume contains chapters on seven more languages, including a section on ergative languages. Languages in this volume include: Georgian; Greenlandic; K'iche Mayan; Warlpiri; Mandarin; Scandinavian and Sesotho.

The Crosslinguistic Study of Language Acquisition Volume 1: the Data

by Dan Isaac Slobin

An essential handbook for professionals and advanced students in the field. Volume 1 contains comprehensive studies on the acquisition of 15 different languages (from ASL to Samoan) -- written by top researchers on each topic. Volume 2 concentrates on theoretical issues, emphasizing current linguistic and psycholinguistic research. Unique in its approach toward individual languages and in its comparative perspective, this book is a hallmark of a rapidly growing area of interdisciplinary, international research.

Crossmedialität im Journalismus und in der Unternehmenskommunikation

by Kim Otto Andreas Köhler

Crossmedialität ‒ das Kreuzen der Medien ‒ ist einer der großen Trends im Journalismus und in der Unternehmenskommunikation. Inhalte werden über mehrere Plattformen publiziert, Organisation, Planung, Recherche und Qualitätssicherung passen sich an. Medienkonvergenz wird von einem theoretischen Konzept zur Medienpraxis. Dieser Band beschreibt den crossmedialen Wandel und erfasst dessen Stand. Dies erfolgt sowohl auf theoretischer als auch auf empirischer Ebene. Zudem werden die Auswirkungen des crossmedialen Wandels auf die Rezeption von Medien empirisch beschrieben und Konzepte dargestellt.

Crossover Preaching: Intercultural-Improvisational Homiletics in Conversation with Gardner C. Taylor (Strategic Initiatives in Evangelical Theology)

by Jared E. Alcántara

As society becomes more culturally diverse and globally connected, churches and seminaries are rapidly changing. And as the church changes, preaching must change too. Crossover Preaching proposes a way forward through conversation with the "dean of the nation?s black preachers," Gardner C. Taylor, senior pastor emeritus of Concord Baptist Church in Brooklyn, New York. In this richly interdisciplinary study, Jared E. Alcántara argues that an analysis of Taylor's preaching reveals an improvisational-intercultural approach that recovers his contemporary significance and equips U. S. churches and seminary classrooms for the future. Alcántara argues that preachers and homileticians need to develop intercultural and improvisational proficiencies to reach an increasingly intercultural church. Crossover Preaching equips them with concrete practices designed to help them cultivate these competencies and thus communicate effectively in a changing world.

Crossroads in New Media, Identity and Law

by Wouter De Been Payal Arora Mireille Hildebrandt

This volume brings together a number of timely contributions at the nexus of new media, politics and law. The central intuition that ties these essays together is that information and communication technology, cultural identity, and legal and political institutions are spheres that co-evolve and interpenetrate in myriad ways. Discussing these shifting relationships, the contributions all probe the question of what shape diversity will take as a result of the changes in the way we communicate and spread information: that is, are we heading to the disintegration and fragmentation of national and cultural identity, or is society moving towards more consolidation, standardization and centralization at a transnational level? In an age of digitization and globalization, this book addresses the question of whether this calls for a new civility fit for the 21st century.

Crowd-Powered Mobile Computing and Smart Things

by Seng W. Loke

This SpringerBrief provides a synergistic overview of technology trends by emphasizing five linked perspectives: crowd+cloud machines, extreme cooperation with smart things, scalable context-awareness, drone services for mobile crowds and social links in mobile crowds. The authors also highlight issues and challenges at the intersection of these trends. Topics covered include cloud computing, Internet of Things, mobile and wearable computing, crowd computing, the culture of thing sharing, collective computing, and swarm dynamics. The brief is a useful resource and a starting point for researchers, students or anyone interested in the contemporary computing landscape.

Crowdsourcing (The MIT Press Essential Knowledge series)

by Daren C. Brabham

A concise introduction to crowdsourcing that goes beyond social media buzzwords to explain what crowdsourcing really is and how it works.Ever since the term “crowdsourcing” was coined in 2006 by Wired writer Jeff Howe, group activities ranging from the creation of the Oxford English Dictionary to the choosing of new colors for M&Ms have been labeled with this most buzz-generating of media buzzwords. In this accessible but authoritative account, grounded in the empirical literature, Daren Brabham explains what crowdsourcing is, what it is not, and how it works.Crowdsourcing, Brabham tells us, is an online, distributed problem solving and production model that leverages the collective intelligence of online communities for specific purposes set forth by a crowdsourcing organization—corporate, government, or volunteer. Uniquely, it combines a bottom-up, open, creative process with top-down organizational goals. Crowdsourcing is not open source production, which lacks the top-down component; it is not a market research survey that offers participants a short list of choices; and it is qualitatively different from predigital open innovation and collaborative production processes, which lacked the speed, reach, rich capability, and lowered barriers to entry enabled by the Internet.Brabham describes the intellectual roots of the idea of crowdsourcing in such concepts as collective intelligence, the wisdom of crowds, and distributed computing. He surveys the major issues in crowdsourcing, including crowd motivation, the misconception of the amateur participant, crowdfunding, and the danger of “crowdsploitation” of volunteer labor, citing real-world examples from Threadless, InnoCentive, and other organizations. And he considers the future of crowdsourcing in both theory and practice, describing its possible roles in journalism, governance, national security, and science and health.

Crowdsourcing

by Daren C. Brabham

Ever since the term "crowdsourcing" was coined in 2006 by Wired writer Jeff Howe, group activities ranging from the creation of the Oxford English Dictionary to the choosing of new colors for M&Ms have been labeled with this most buzz-generating of media buzzwords. In this accessible but authoritative account, grounded in the empirical literature, Daren Brabham explains what crowdsourcing is, what it is not, and how it works. Crowdsourcing, Brabham tells us, is an online, distributed problem solving and production model that leverages the collective intelligence of online communities for specific purposes set forth by a crowdsourcing organization -- corporate, government, or volunteer. Uniquely, it combines a bottom-up, open, creative process with top-down organizational goals. Crowdsourcing is not open source production, which lacks the top-down component; it is not a market research survey that offers participants a short list of choices; and it is qualitatively different from predigital open innovation and collaborative production processes, which lacked the speed, reach, rich capability, and lowered barriers to entry enabled by the Internet. Brabham describes the intellectual roots of the idea of crowdsourcing in such concepts as collective intelligence, the wisdom of crowds, and distributed computing. He surveys the major issues in crowdsourcing, including crowd motivation, the misconception of the amateur participant, crowdfunding, and the danger of "crowdsploitation" of volunteer labor, citing real-world examples from Threadless, InnoCentive, and other organizations. And he considers the future of crowdsourcing in both theory and practice, describing its possible roles in journalism, governance, national security, and science and health.

Crucial Accountability: Tools for Resolving Violated Expectations, Broken Commitments, and Bad Behavior (Second Edition)

by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler David Maxfield.

In this UPDATED SECOND EDITION (first edition titled "Crucial Confrontations"), you'll learn how to hold anyone accountable, master performance discussions, and get results. Everyone knows how to run for cover, or, if sufficiently provoked, step up to problems in a way that causes a real ruckus. Crucial Accountability teaches you how to deal with violated expectations in a way that solves the problem at hand without harming the relationship--and, in fact, even strengthens it. Broken promises, missed deadlines, poor behavior--they don't just make others' lives miserable; they can sap up to 50 percent of organizational performance and account for the vast majority of divorces. Crucial Accountability offers the tools for improving relationships in the workplace and in life and for resolving all these problems--permanently.

Crucial Confrontations: Tools for Resolving Broken Promises, Violated Expectations, and Bad Behavior

by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler Tom Peters

The authors of the New York Times bestseller Crucial Conversations show you how to achieve personal, team, and organizational success by healing broken promises, resolving violated expectations, and influencing good behavior Discover skills to resolve touchy, controversial, and complex issues at work and at home--now available in this follow-up to the internationally popular Crucial Conversations. Behind the problems that routinely plague organizations and families, you'll find individuals who are either unwilling or unable to deal with failed promises. Others have broken rules, missed deadlines, failed to live up to commitments, or just plain behaved badly--and nobody steps up to the issue. Or they do, but do a lousy job and create a whole new set of problems. Accountability suffers and new problems spring up. New research demonstrates that these disappointments aren't just irritating, they're costly--sapping organizational performance by twenty to fifty percent and accounting for up to ninety percent of divorces. Crucial Confrontations teaches skills drawn from 10,000 hours of real-life observations to increase confidence in facing issues like: An employee speaks to you in an insulting tone that crosses the line between sarcasm and insubordination. Now what? Your boss just committed you to a deadline you know you can't meet--and not-so-subtly hinted he doesn't want to hear complaints about it. Your son walks through the door sporting colorful new body art that raises your blood pressure by forty points. Speak now, pay later. An accountant wonders how to step up to a client who is violating the law. Can you spell unemployment? Family members fret over how to tell granddad that he should no longer drive his car. This is going to get ugly. A nurse worries about what to say to an abusive physician. She quickly remembers "how things work around here" and decides not to say anything. Everyone knows how to run for cover, or if adequately provoked, step up to these confrontations in a way that causes a real ruckus. That we have down pat. Crucial Confrontations teaches you how to deal with violated expectations in a way that solves the problem at hand, and doesn't harm the relationship--and in fact, even strengthens it. Crucial Confrontations borrows from twenty years of research involving two groups. More than 25,000 people helped the authors identify those who were most influential during crucial confrontations. They spent 10,000 hours watching these people, documented what they saw, and then trained and tested with more than 300,000 people. Second, they measured the impact of crucial confrontations improvements on organizational and team performance--the results were immediate and sustainable: twenty to fifty percent improvements in measurable performance.

Crucial Conversations: Tools for Talking When Stakes are High

by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler and Emily Gregory

The book that revolutionized business communications has been updated for today’s workplace. Crucial Conversations provides powerful skills to ensure every conversation—especially difficult ones—leads to the results you want. Written in an engaging and witty style, the book teaches readers how to be persuasive rather than abrasive, how to get back to productive dialogue when others blow up or clam up, and it offers powerful skills for mastering high-stakes conversations, regardless of the topic or person. <P><P>Whether they take place at work or at home, with your coworkers or your spouse, crucial conversations have a profound impact on your career, your happiness, and your future. With the skills you learn in this book, you'll never have to worry about the outcome of a crucial conversation again.

Crucial Conversations: Tools for Talking When Stakes are High

by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler

The New York Times and Washington Post bestseller that changed the way millions communicate "[Crucial Conversations] draws our attention to those defining moments that literally shape our lives, our relationships, and our world. . . . This book deserves to take its place as one of the key thought leadership contributions of our time. " --from the Foreword by Stephen R. Covey, author of The 7 Habits of Highly Effective People "The quality of your life comes out of the quality of your dialogues and conversations. Here's how to instantly uplift your crucial conversations. " --Mark Victor Hansen, cocreator of the #1 New York Times bestselling series Chicken Soup for the Soul#65533; The first edition of Crucial Conversations exploded onto the scene and revolutionized the way millions of people communicate when stakes are high. This new edition gives you the tools to: Prepare for high-stakes situations Transform anger and hurt feelings into powerful dialogue Make it safe to talk about almost anything Be persuasive, not abrasive

Crucial Conversations: Tools for Talking When Stakes Are High

by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler Stephen R. Covey

Four cofounders of a corporate consulting firm present their formula for effective communication, based on the trial and error of years spent as corporate trainers. The reader is drilled not only in communication skills but also to recognize bad or shifty modes of communication, to develop integrity in word and deed, and to achieve more effective work habits. Annotation c. Book News, Inc., Portland, OR (booknews.com)

The Cruel Radiance: Photography and Political Violence

by Susie Linfield

In The Cruel Radiance, Susie Linfield challenges the idea that photographs of political violence exploit their subjects and pander to the voyeuristic tendencies of their viewers. Instead she argues passionately that looking at such images—and learning to see the people in them—is an ethically and politically necessary act that connects us to our modern history of violence and probes the human capacity for cruelty. Grappling with critics from Walter Benjamin and Bertolt Brecht to Susan Sontag and the postmoderns—and analyzing photographs from such events as the Holocaust, China’s Cultural Revolution, and recent terrorist acts—Linfield explores the complex connection between photojournalism and the rise of human rights ideals. In the book’s concluding section, she examines the indispensable work of Robert Capa, James Nachtwey, and Gilles Peress and asks how photography should respond to the increasingly nihilistic trajectory of modern warfare.A bracing and unsettling book, The Cruel Radiance convincingly demonstrates that if we hope to alleviate political violence, we must first truly understand it—and to do that, we must begin to look.

Crusading Iowa Journalist Verne Marshall: Exposing Graft and the 1936 Pulitzer Prize

by Jerry Harrington

On December 12, 1934, police raided a canning factory in Cedar Rapids, uncovering an illegal liquor and gambling set-up. Verne Marshall, tempestuous editor of the Cedar Rapids Gazette, sensed a bigger story and a wider network of corruption. His aggressive investigative reporting led to multiple resignations, nearly fifty indictments and the dramatic trial of the state’s attorney general. These explosive exposés earned Verne Marshall and the paper the 1936 Pulitzer Prize. Author Jerry Harrington traces the legacy of Marshall’s incendiary crusade across Iowa’s political landscape.

The Crushing of Poland: Rare Photographs from Wartime Archives (Images of War)

by Ian Baxter

"Hitlers decision to invade Poland in August 1939 triggered the start of the Second World War. It was also the first demonstration of Blitzkrieg tactics the ruthless use of armor, mobile infantry and air support. The brave Polish army, inadequately equipped and inferior in numbers, was overwhelmed by this awesome display of military power as well as being taken by surprise. Official German photographers accompanied the triumphant Nazi forces on their victorious advance which first seized the key part of Danzig and then Warsaw, all within one month. The Crushing of Poland captures the drama and raw aggression of the Campaign in photographs and full captions."

Crypto and AI: From Coevolution to Quantum Revolution

by Behrouz Zolfaghari Hamid Nemati Naoto Yanai Khodakhast Bibak

This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.

Crypto-Politics: Encryption and Democratic Practices in the Digital Era (Routledge New Security Studies)

by Linda Monsees

This book examines current debates about the politics of technology and the future of democratic practices in the digital era. The volume centres on the debates on digital encryption in Germany and the USA, during the aftermath of Edward Snowden’s leaks, which revolved around the value of privacy and the legitimacy of surveillance practices. Using a discourse analysis of mass media and specialist debates, it shows how these are closely interlinked with technological controversies and how, as a result, contestation emerges not within one public sphere but within multiple expert circles. The book develops the notion of ‘publicness’ in order to grasp the political significance of these controversies, thereby making an innovative contribution to Critical Security Studies by introducing digital encryption as an important site for understanding the broader debates on cyber security and surveillance. This book will be of much interest to students of critical security studies, science and technology studies, and International Relations.

Cryptographic Engineering

by Cetin Kaya Koc

This book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type material for professional engineers and computer information specialists.

Cryptography: A Very Short Introduction

by Fred Piper Sean Murphy

Provide information about cryptography, gives tips and techniques.

Cryptography (Springer Undergraduate Mathematics Ser.)

by Simon Rubinstein-Salzedo

This text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication.Beginning with classical ciphers and their cryptanalysis, this book proceeds to focus on modern public key cryptosystems such as Diffie-Hellman, ElGamal, RSA, and elliptic curve cryptography with an analysis of vulnerabilities of these systems and underlying mathematical issues such as factorization algorithms. Specialized topics such as zero knowledge proofs, cryptographic voting, coding theory, and new research are covered in the final section of this book.Aimed at undergraduate students, this book contains a large selection of problems, ranging from straightforward to difficult, and can be used as a textbook for classes as well as self-study. Requiring only a solid grounding in basic mathematics, this book will also appeal to advanced high school students and amateur mathematicians interested in this fascinating and topical subject.

Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings (Lecture Notes in Computer Science #9496)

by Jens Groth

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9540)

by Enes Pasalic Lars R. Knudsen

This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryption.

Refine Search

Showing 3,676 through 3,700 of 17,279 results