Browse Results

Showing 33,826 through 33,850 of 61,734 results

Learning with Partially Labeled and Interdependent Data

by Massih-Reza Amini Nicolas Usunier

This book develops two key machine learning principles: the semi-supervised paradigm and learning with interdependent data. It reveals new applications, primarily web related, that transgress the classical machine learning framework through learning with interdependent data. The book traces how the semi-supervised paradigm and the learning to rank paradigm emerged from new web applications, leading to a massive production of heterogeneous textual data. It explains how semi-supervised learning techniques are widely used, but only allow a limited analysis of the information content and thus do not meet the demands of many web-related tasks. Later chapters deal with the development of learning methods for ranking entities in a large collection with respect to precise information needed. In some cases, learning a ranking function can be reduced to learning a classification function over the pairs of examples. The book proves that this task can be efficiently tackled in a new framework: learning with interdependent data. Researchers and professionals in machine learning will find these new perspectives and solutions valuable. Learning with Partially Labeled and Interdependent Data is also useful for advanced-level students of computer science, particularly those focused on statistics and learning.

Learning with Technologies and Technologies in Learning: Experience, Trends and Challenges in Higher Education (Lecture Notes in Networks and Systems #456)

by Michael E. Auer Dominik May Andreas Pester

Education has always been one of the cornerstones for societal evolution and economic growth. We are currently witnessing a significant transformation in the development of education and especially post-secondary education.The use of technology impacts the way educational content is presented and acquired in many areas. The designs of immersive educational worlds and the combination of rational and emotional educational experiences that cannot be designed in the same way in the traditional classroom will come increasingly into focus.Seen in this way the book also contributes to generalize the experience of the COVID-19 crisis and its impact to quality of learning and education.Scientifically based statements as well as excellent experiences (best practice) are necessary. This book contains scientific papers in the fields of: The future of learning Eruptive technologies in learningPedagogy of online learning Deep learning vs machine learning: opportunities and challengesReimagining and rapid transition of learningInterested readership includes policymakers, academics, educators, researchers in pedagogy and learning theory, schoolteachers, learning industry, further and continuing education lecturers, etc.

Learning with Uncertainty

by Xizhao Wang Junhai Zhai

Learning with uncertainty covers a broad range of scenarios in machine learning, this book mainly focuses on: (1) Decision tree learning with uncertainty, (2) Clustering under uncertainty environment, (3) Active learning based on uncertainty criterion, and (4) Ensemble learning in a framework of uncertainty. The book starts with the introduction to uncertainty including randomness, roughness, fuzziness and non-specificity and then comprehensively discusses a number of key issues in learning with uncertainty, such as uncertainty representation in learning, the influence of uncertainty on the performance of learning system, the heuristic design with uncertainty, etc. <P><P>Most contents of the book are our research results in recent decades. The purpose of this book is to help the readers to understand the impact of uncertainty on learning processes. It comes with many examples to facilitate understanding. The book can be used as reference book or textbook for researcher fellows, senior undergraduates and postgraduates majored in computer science and technology, applied mathematics, automation, electrical engineering, etc.

Learning with the Minimum Description Length Principle

by Kenji Yamanishi

This book introduces readers to the minimum description length (MDL) principle and its applications in learning. The MDL is a fundamental principle for inductive inference, which is used in many applications including statistical modeling, pattern recognition and machine learning. At its core, the MDL is based on the premise that “the shortest code length leads to the best strategy for learning anything from data.” The MDL provides a broad and unifying view of statistical inferences such as estimation, prediction and testing and, of course, machine learning.The content covers the theoretical foundations of the MDL and broad practical areas such as detecting changes and anomalies, problems involving latent variable models, and high dimensional statistical inference, among others. The book offers an easy-to-follow guide to the MDL principle, together with other information criteria, explaining the differences between their standpoints. Written in a systematic, concise and comprehensive style, this book is suitable for researchers and graduate students of machine learning, statistics, information theory and computer science.

Learning zANTI2 for Android Pentesting

by Miroslav Vitula

Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 About This Book * Understand the basics of wireless penetration testing and its importance * Learn the techniques to perform penetration testing on your wireless networks, such as scanning, detecting vulnerabilities in your victim, and then attacking * This simple and intriguing guide takes a step-by-step approach that will help you get to grips with network pentesting using just your Android device and zANTI2 Who This Book Is For The book is intended for those who want to know more about network penetration tests and have no prior experience, as well as for those who are experienced in network systems and are curious to discover more about this topic. Since zANTI2 features an extremely intuitive and easy to control interface, it doesn't require any special skills. What You Will Learn * Understand the importance of penetration testing throughout systems * Take a run through zANTI2's interface and understand the requirements to the app * Perform advanced scanning/network mapping and discover the various types of scans used on a target * Discover and remotely connect to open ports on a target, thereby accessing a target's files and folders remotely * Detect vulnerabilities on a target, learn how to remotely exploit them, and discover ways to protect your self from these exploits * Understand what an MITM attack is and how it works, and apply this knowledge to perform attacks on network targets * Learn to hijack sessions, identify victim's passwords, replace images on websites, inject scripts, and more * Use this knowledge to protect yourself from all of the attacks you will study In Detail A penetration test is one of the most important methods to secure a network or any individual machine. Having knowledge of these methods can enable a user to protect himself/herself from any kinds of attacks. Penetration tests can also be used to discover flaws or loop holes in one's security system, which if not fixed, can be exploited by an unwanted entity. This book starts off with an introduction to what penetration testing is, and how it can be performed on Android using zANTI2. Once you are aware of the basics, we move on to teach you the different types of scans that can be performed to search for targets. You will then learn how to connect to open ports and intrude into an unsecured computer. From here you will explore vulnerabilities and their usage, including ShellShock and SSL Poodle vulnerability. When connected to an open network, a user is susceptible to password and session hijacking, and a number of other cyber attacks. The book therefore ends with one of the main aspects of cyber security: the Man in the Middle attack. You will get to know everything about the MITM attack, how it works, and how one can be protected against it. Style and approach The book follows a step-by-step approach with each of the parts explained in an easy-to-follow style. Most of the methods showcased can be tried out immediately on almost any network.

Learning, Creating, and Using Knowledge: Concept Maps as Facilitative Tools in Schools and Corporations

by Joseph D. Novak

This fully revised and updated edition of Learning, Creating, and Using Knowledge recognizes that the future of economic well being in today's knowledge and information society rests upon the effectiveness of schools and corporations to empower their people to be more effective learners and knowledge creators. Novak’s pioneering theory of education presented in the first edition remains viable and useful. This new edition updates his theory for meaningful learning and autonomous knowledge building along with tools to make it operational ─ that is, concept maps, created with the use of CMapTools and the V diagram. The theory is easy to put into practice, since it includes resources to facilitate the process, especially concept maps, now optimised by CMapTools software. CMapTools software is highly intuitive and easy to use. People who have until now been reluctant to use the new technologies in their professional lives are will find this book particularly helpful. Learning, Creating, and Using Knowledge is essential reading for educators at all levels and corporate managers who seek to enhance worker productivity.

Learning, Design, and Technology: An International Compendium of Theory, Research, Practice, and Policy

by J. Michael Spector Barbara B. Lockee Marcus D. Childress

The multiple, related fields encompassed by this Major Reference Work represent a convergence of issues and topics germane to the rapidly changing segments of knowledge and practice in educational communications and technology at all levels and around the globe. There is no other comparable work that is designed not only to gather vital, current, and evolving information and understandings in these knowledge segments but also to be updated on a continuing basis in order to keep pace with the rapid changes taking place in the relevant fields. The Handbook is composed of substantive (5,000 to 15,000 words), peer-reviewed entries that examine and explicate seminal facets of learning theory, research, and practice. It provides a broad range of relevant topics, including significant developments as well as innovative uses of technology that promote learning, performance, and instruction. This work is aimed at researchers, designers, developers, instructors, and other professional practitioners.

Learning, Teaching, and Social Media: A Generational Approach (Routledge Research in Digital Education and Educational Technology)

by Andrew McWhirter

Employing a unique generational approach, this book critically assesses social media in educational contexts across all educational levels: from primary and secondary schools to further and higher education, proposing a schema for social media literacy (SML). Using research obtained from fieldwork observations conducted in online teaching groups, surveys, and in-depth interviews with teachers and educators on the topic of social media and education, chapters interrogate the historical relationship between educator and learner, and use the frame of expert methodology to understand what educators themselves consider important about social media and education relative to their sectors. Bringing together current literature from education, learning and media technologies, along with longstanding debates around technological influence, chapters also draw on audience and communication studies, psychology and arts and humanities at a time when many different disciplines are trying to understand what social media means to our society. This interdisciplinary volume will be of great interest to academics, researchers and postgraduates in the fields of technology in education, media literacy, and critical digital media. Practitioners involved in the sociology of education will also find the book of use.

Learning-Based Reconfigurable Multiple Access Schemes for Virtualized MTC Networks (Wireless Networks)

by Tho Le-Ngoc Atoosa Dalili Shoaei

This book assists readers with understanding the key aspects, problems and solutions related to the design of proper Multiple Access Schemes for MTC (Machine-Type Communications) and IoT applications in 5G-and-beyond wireless networks. An overview of MTC applications and their traffic features are also provided. In addition, it presents a comprehensive review of MTC access schemes including orthogonal multiple access schemes (OMA), non-orthogonal multiple access schemes (NOMA), massive MIMO-based schemes and fast uplink grant approaches. It also proposes efficient and reconfigurable access schemes deploying machine learning and optimization techniques to address the main requirements of MTC networks. This book discusses potential research directions to further enhance the performance of MTC access schemes.Machine-type communications are expected to account for the dominant share of the traffic in future wireless networks. While in traditional wireless networks, designed for human-type communications, the focus is on support of large packet sizes in downlink, machine-type communication systems deal with heavy uplink traffic. This is due to the nature of the tasks performed by machine-type communication devices, which is mainly reporting measured data or a detected event. Furthermore, in these networks, using the virtualization framework, the network infrastructure can be shared between different applications for which providing isolation is of high importance. To support these unique characteristics of machine-type communications, proper access schemes need to be developed, which is the focus of this book.This book benefits advanced-level students studying computer science and electrical engineering as a secondary textbook and researchers working in this field. Engineers and practitioners interested in the challenges and practical solutions of integrating MTC in the cloud radio access network of 5G-and-beyond cellular systems will want to purchase this book as well.

Learning-based VANET Communication and Security Techniques (Wireless Networks)

by Weihua Zhuang Liang Xiao Sheng Zhou Cailian Chen

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book.This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

Least Privilege Security for Windows 7, Vista and XP

by Russell Smith

This practical handbook has detailed step-by-step instructions for implementing Least Privilege Security and related management technologies. It has solutions to the most common technical challenges and Microsoft best practice advice. It also covers techniques for managing Least Privilege on the desktop. This book is for System Administrators or desktop support staff who want to implement Least Privilege Security on Windows systems.

Lecture Notes in Computational Intelligence and Decision Making: 2020 International Scientific Conference "Intellectual Systems of Decision-making and Problems of Computational Intelligence” (Advances in Intelligent Systems and Computing #1246)

by Waldemar Wójcik Volodymyr Lytvynenko Sergii Babichev Svetlana Vyshemyrskaya

This book includes 46 scientific papers presented at the conference and reflecting the latest research in the fields of data mining, machine learning and decision-making. The international scientific conference “Intellectual Systems of Decision-Making and Problems of Computational Intelligence” was held in the Kherson region, Ukraine, from May 25 to 29, 2020. The papers are divided into three sections: “Analysis and Modeling of Complex Systems and Processes,” “Theoretical and Applied Aspects of Decision-Making Systems” and “Computational Intelligence and Inductive Modeling.” The book will be of interest to scientists and developers specialized in the fields of data mining, machine learning and decision-making systems.

Lecture Notes in Computational Intelligence and Decision Making: 2021 International Scientific Conference "Intellectual Systems of Decision-making and Problems of Computational Intelligence”, Proceedings (Lecture Notes on Data Engineering and Communications Technologies #77)

by Volodymyr Lytvynenko Sergii Babichev

This book is devoted to current problems of artificial and computational intelligence including decision-making systems. Collecting, analysis, and processing information are the current directions of modern computer science. Development of new modern information and computer technologies for data analysis and processing in various fields of data mining and machine learning creates the conditions for increasing effectiveness of the information processing by both the decrease of time and the increase of accuracy of the data processing. The book contains of 54 science papers which include the results of research concerning the current directions in the fields of data mining, machine learning, and decision making. The papers are divided in terms of their topic into three sections. The first section "Analysis and Modeling of Complex Systems and Processes" contains of 26 papers, and the second section "Theoretical and Applied Aspects of Decision-Making Systems" contains of 13 papers. There are 15 papers in the third section "Computational Intelligence and Inductive Modeling". The book is focused to scientists and developers in the fields of data mining, machine learning and decision-making systems.

Lecture Notes in Computational Intelligence and Decision Making: Proceedings of the XV International Scientific Conference “Intellectual Systems of Decision Making and Problems of Computational Intelligence” (ISDMCI'2019), Ukraine, May 21–25, 2019 (Advances in Intelligent Systems and Computing #1020)

by Waldemar Wójcik Volodymyr Lytvynenko Sergii Babichev Olena Vynokurova Svetlana Vyshemyrskaya Svetlana Radetskaya

Information and computer technologies for data analysis and processing in various fields of data mining and machine learning generates the conditions for increasing the effectiveness of information processing by making it faster and more accurate. The book includes 49 scientific papers presenting the latest research in the fields of data mining, machine learning and decision-making. Divided into three sections: “Analysis and Modeling of Complex Systems and Processes”; “Theoretical and Applied Aspects of Decision-Making Systems”; and “Computational Intelligence and Inductive Modeling”, the book is of interest to scientists and developers in the field.

Lecture Notes in Data Engineering, Computational Intelligence, and Decision Making: 2022 International Scientific Conference "Intellectual Systems of Decision-Making and Problems of Computational Intelligence”, Proceedings (Lecture Notes on Data Engineering and Communications Technologies #149)

by Volodymyr Lytvynenko Sergii Babichev

This book contains of 39 scientific papers which include the results of research regarding the current directions in the fields of data mining, machine learning and decision-making. This book is devoted to current problems of artificial and computational intelligence including decision-making systems. Collecting, analysis and processing information are the current directions of modern computer science. Development of new modern information and computer technologies for data analysis and processing in various fields of data mining and machine learning create the conditions for increasing effectiveness of the information processing by both the decrease of time and the increase of accuracy of the data processing.The papers are divided in terms of their topic into three sections. The first section "Analysis and Modeling of Hybrid Systems and Processes" contains of 11 papers, and the second section "Theoretical and Applied Aspects of Decision-Making Systems" contains of 11 ones too. There are 17 papers in the third section "Data Engineering, Computational Intelligence and Inductive Modeling". The book is focused to scientists and developers in the fields of data mining, machine learning and decision-making systems.

Lecture Notes in Data Engineering, Computational Intelligence, and Decision-Making, Volume 1: 2024 International Scientific Conference "Intelligent Systems of Decision-Making and Problems of Computational Intelligence”, Proceedings (Lecture Notes on Data Engineering and Communications Technologies #219)

by Volodymyr Lytvynenko Sergii Babichev

This book addresses contemporary challenges in artificial and computational intelligence, particularly focusing on decision-making systems. It explores current trends in computer science, including the collection, analysis, and processing of information. The advancement of modern information and computer technologies for data analysis and processing in data mining and machine learning is highlighted, showcasing their role in enhancing the efficiency of information processing by reducing time and increasing accuracy. The book comprises 37 scientific papers presenting cutting-edge research in data mining, machine learning, and decision-making. It is categorized into three sections: 1. Analysis and modeling of hybrid systems and processes—14 papers. 2. Theoretical and applied aspects of decision-making systems—7 papers. 3. Data engineering, computational intelligence, and inductive modeling—16 papers. This book is designed for scientists and developers specializing in data mining, machine learning, and decision-making systems.

Lecture Notes in Data Engineering, Computational Intelligence, and Decision-Making, Volume 2: 2024 International Scientific Conference "Intelligent Systems of Decision-Making and Problems of Computational Intelligence”, Proceedings (Lecture Notes on Data Engineering and Communications Technologies #244)

by Volodymyr Lytvynenko Sergii Babichev

This book addresses contemporary challenges in artificial and computational intelligence, particularly focusing on decision-making systems. It explores current trends in computer science, including the collection, analysis, and processing of information. The advancement of modern information and computer technologies for data analysis and processing in data mining and machine learning is highlighted, showcasing their role in enhancing the efficiency of information processing by reducing time and increasing accuracy. The book comprises 16 scientific papers presenting cutting-edge research in data mining, machine learning, and decision-making. It is categorized into three sections: 1. Data engineering, computational intelligence, and inductive modeling—16 papers. This book is designed for scientists and developers specializing in data mining, machine learning, and decision-making systems.

Lecture Notes in Real-Time Intelligent Systems (Advances In Intelligent Systems And Computing #756)

by Jolanta Mizera-Pietraszko Pit Pichappan Lahby Mohamed

The second volume of the book series highlights works presented at the 2nd International Conference on Real Time Intelligent Systems, held in Casablanca on October 18-20, 2017​. The book offers a comprehensive, practical review of the state-of-the-art in designing and implementing real-time intelligent computing for the areas within the conference’s scope such as robotics, intelligent alert systems, IoT, remote access control, multi-agent systems, networking, mobile smart systems, crowdsourcing, broadband systems, cloud computing, streaming data and many other applications. Research in real-time computing supports decision making in dynamic environments. Some examples include ABS, FBW flight control, automatic air-conditioning, etc. Intelligent computing relies heavily on artificial intelligence (AI) to make computers act for humans. The authors are confident that the solutions discussed in this book will provide a unique source of information and inspiration for researchers working in AI, distributed coding algorithms or smart services and platforms, and for IT professionals, who can integrate the proposed methods into their practice.

Lectures on Convex Optimization: A Basic Course (Springer Optimization and Its Applications #137)

by Yurii Nesterov

This book provides a comprehensive, modern introduction to convex optimization, a field that is becoming increasingly important in applied mathematics, economics and finance, engineering, and computer science, notably in data science and machine learning. Written by a leading expert in the field, this book includes recent advances in the algorithmic theory of convex optimization, naturally complementing the existing literature. It contains a unified and rigorous presentation of the acceleration techniques for minimization schemes of first- and second-order. It provides readers with a full treatment of the smoothing technique, which has tremendously extended the abilities of gradient-type methods. Several powerful approaches in structural optimization, including optimization in relative scale and polynomial-time interior-point methods, are also discussed in detail. Researchers in theoretical optimization as well as professionals working on optimization problems will find this book very useful. It presents many successful examples of how to develop very fast specialized minimization algorithms. Based on the author’s lectures, it can naturally serve as the basis for introductory and advanced courses in convex optimization for students in engineering, economics, computer science and mathematics.

Lectures on Digital Design Principles (River Publishers Series in Electronic Materials, Circuits and Devices)

by Pinaki Mazumder Idongesit E. Ebong

Lectures on Digital Design Principles provides students an accessible reference for engaging with the building blocks of digital logic design. The book is an aggregation of lectures for an introductory course and provides a conversational style to better engage with students. Since the text is developed from lectures, important and foundational concepts are highlighted without tedious proofs. With respect to subject matter, students are introduced to different methods of abstracting digital systems, along with the strengths and weaknesses of these different methods. For example, Boolean logic can be represented as algebraic equations, gate level diagrams, switching circuits, truth tables, etc. Strengths and drawbacks to these representations are discussed in the context of Boolean minimization and electronic design automation. The text also delves into dynamic behavior of digital circuits with respect to timing in combinational circuits and state transitions in sequential circuits.

Lectures on Quantum Mechanics: With Problems, Exercises and Solutions (Graduate Texts in Physics)

by Jean-Louis Basdevant

Beautifully illustrated and engagingly written, Twelve Lectures in Quantum Mechanics presents theoretical physics with a breathtaking array of examples and anecdotes. Basdevant’s style is clear and stimulating, in the manner of a brisk lecture that can be followed with ease and enjoyment. Here is a sample of the book’s style, from the opening of Chapter 1: "If one were to ask a passer-by to quote a great formula of physics, chances are that the answer would be ‘E = mc2’…. There is no way around it: all physics is quantum, from elementary particles, to stellar physics and the Big Bang, not to mention semiconductors and solar cells."

Lectures on Runtime Verification

by Ezio Bartocci Yliès Falcone

The idea of this volume originated from the need to have a book for students to support their training with several tutorials on different aspects of RV. The volume has been organized into seven chapters and the topics covered include an introduction on runtime verification, dynamic analysis of concurrency errors, monitoring events that carry data, runtime error reaction and prevention, monitoring of cyber-physical systems, runtime verification for decentralized and distributed systems and an industrial application of runtime verification techniques in financial transaction systems.

Lee de Forest

by Mike Adams

The life-long inventor, Lee de Forest invented the three-element vacuum tube used between 1906 and 1916 as a detector, amplifier, and oscillator of radio waves. Beginning in 1918 he began to develop a light valve, a device for writing and reading sound using light patterns. While he received many patents for his process, he was initially ignored by the film industry. In order to promote and demonstrate his process he made several hundred sound short films, he rented space for their showing; he sold the tickets and did the publicity to gain audiences for his invention. Lee de Forest officially brought sound to film in 1919. Lee De Forest: King of Radio, Television, and Film is about both invention and early film making; de Forest as the scientist and producer, director, and writer of the content. This book tells the story of de Forest's contribution in changing the history of film through the incorporation of sound. The text includes primary source historical material, U.S. patents and richly-illustrated photos of Lee de Forest's experiments. Readers will greatly benefit from an understanding of the transition from silent to audio motion pictures, the impact this had on the scientific community and the popular culture, as well as the economics of the entertainment industry.

Left Atrial and Scar Quantification and Segmentation: First Challenge, LAScarQS 2022, Held in Conjunction with MICCAI 2022, Singapore, September 18, 2022, Proceedings (Lecture Notes in Computer Science #13586)

by Xiahai Zhuang Lei Li Sihan Wang Fuping Wu

This book constitutes the First Left Atrial and Scar Quantification and Segmentation Challenge, LAScarQS 2022, which was held in conjunction with the 25th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2022, in Singapore, in September 2022.The 15 papers presented in this volume were carefully reviewed and selected form numerous submissions. The aim of the challenge is not only benchmarking various LA scar segmentation algorithms, but also covering the topic of general cardiac image segmentation, quantification, joint optimization, and model generalization, and raising discussions for further technical development and clinical deployment.

Left to Our Own Devices: Outsmarting Smart Technology to Reclaim Our Relationships, Health, and Focus (The\mit Press Ser.)

by Margaret E. Morris

Unexpected ways that individuals adapt technology to reclaim what matters to them, from working through conflict with smart lights to celebrating gender transition with selfies.We have been warned about the psychological perils of technology: distraction, difficulty empathizing, and loss of the ability (or desire) to carry on a conversation. But our devices and data are woven into our lives. We can't simply reject them. Instead, Margaret Morris argues, we need to adapt technology creatively to our needs and values. In Left to Our Own Devices, Morris offers examples of individuals applying technologies in unexpected ways—uses that go beyond those intended by developers and designers. Morris examines these kinds of personalized life hacks, chronicling the ways that people have adapted technology to strengthen social connection, enhance well-being, and affirm identity. Morris, a clinical psychologist and app creator, shows how people really use technology, drawing on interviews she has conducted as well as computer science and psychology research. She describes how a couple used smart lights to work through conflict; how a woman persuaded herself to eat healthier foods when her photographs of salads garnered “likes” on social media; how a trans woman celebrated her transition with selfies; and how, through augmented reality, a woman changed the way she saw her cancer and herself. These and the many other “off-label” adaptations described by Morris cast technology not just as a temptation that we struggle to resist but as a potential ally as we try to take care of ourselves and others. The stories Morris tells invite us to be more intentional and creative when left to our own devices.

Refine Search

Showing 33,826 through 33,850 of 61,734 results