Filters








70 Hits in 12.3 sec

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  If the text file gets messed up, you can edit it with ed. The schema keeps the database from being messed up too badly.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

Concurrent Computing in the Many-core Era (Dagstuhl Seminar 15021)

Michael Philippsen, Pascal Felber, Michael L. Scott, J. Eliot B. Moss, Marc Herbstritt
2015 Dagstuhl Reports  
This seminar is a successor to Dagstuhl Seminars 08241 "Transactional memory: From implementation to application" and 12161 "Abstractions for scalable multicore computing", respectively held in June 2008  ...  and potential uses of emerging hardware support for synchronization extensions, and (3) considering the increasing complexity resulting from the explosion in heterogeneity.  ...  Multiple users, variety of devices, access to my workspace from all devices (and ability to run code on all these devices).  ... 
doi:10.4230/dagrep.5.1.1 dblp:journals/dagstuhl-reports/PhilippsenFSM15 fatcat:owcmta65hzb5vmglwq3dwzbehy

Signs of Appropriation: A Semiotic Account of Breakdowns with IoT Technology

Bruno A. Chagas, David F. Redmiles, Clarisse S. de Souza
2019 Journal of Interactive Systems  
We propose that, together, they have the potential to support productive decision making by IoT designers, as well as to raise new research questions on the topic.  ...  By using semiotic theory and thematic analysis to investigate data from diaries, questionnaires and interviews collected from a group of eleven participants, we characterized IoT appropriation as interpretive  ...  Volkmar Pipek from the University of Siegen for the collaboration and insightful discussions.  ... 
doi:10.5753/jis.2019.550 fatcat:fdxd7tefkjabpow5nckmq77v4q

Using complexity to protect elections

Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
2010 Communications of the ACM  
There is no practical, affordable way to mask the failures from the applications.  ...  The byte-code instructions x load and xstore access memory to read from and write to fields of objects, respectively (x changes depending on the type of the field).  ...  All application material should be sent by e-mail to search@ cs.appstate.edu in a single PDF file attachment or by mail to the chair of the search committee: Dr.  ... 
doi:10.1145/1839676.1839696 fatcat:hbqpm5boabe3jcpa4jcs7czf6y

The `Chicken and Egg' of Subjective and Social Factors in Desistance from Crime

Thomas P. LeBel, Ros Burnett, Shadd Maruna, Shawn Bushway
2008 European Journal of Criminology  
The main reason for this change is to make the journal more easily accessible and therefore, we hope and expect, much more widely read. Do please tell all your friends and colleagues the good news!  ...  As she writes in her introduction, we believe this to be the first journal ever to devote an entire issue to contributions made by people who have desisted from offending, some of whom may indeed describe  ...  It was like the purpose of orientation was to mold us into androids. However, in the actual prison culture, the rules of the institution were disregarded and there was a series of unwritten rules.  ... 
doi:10.1177/1477370807087640 fatcat:7g7y7p5fvbdsfnugxkx4relyx4

Mapping The Drowned World

Tracey Clement
2017 Cartographic Perspectives  
The result is too different from the SSSS and fabric cones even if it worked. Suggested modifications: Return to stitching in whole structures from the beginning.  ...  Try adding the bulk of them much later (after stopping SSSS).  ...  fears of the Cold War and the present, because it does seem to predict climate change.  ... 
doi:10.14714/cp85.1401 fatcat:bekjjnvrsjfmlnjd4sdowgwhgm

OSTP-AWhite House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence

Kris Kitchen
2017 Figshare  
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence  ...  fraction of the populace simply does not have (nor can easily be given) skills of significant economic value.  ...  ); we also support AI safetyrelevant research agendas from MIRI (https://intelligence.org/files/TechnicalAgenda.pdf) and as suggested in .  ... 
doi:10.6084/m9.figshare.4640305 fatcat:26aelpe4ejbupao5yh2mys2pzq

"No Country for E-Lit?" – India and Electronic Literature

Souvik Mukherjee
2017 Hyperrhiz  
oriented towards everyday lifestyle applications.  ...  I went to the kabari (scrap dealer) shop in my lane and bought a cycle rim. Then, went up to my roof, removed the wire from the antenna and tied it to the cycle rim.  ...  The material may vary from newsprint to video to sound to binary code, or a combination of the same, and the journal may transmogrify from being a witness, to a participant in that which is being recorded  ... 
doi:10.20415/hyp/016.e08 fatcat:ik7x2ivbxjdljoxfh4pyk3vt3y

A History of Comparative Advertising in the United States

Fred K. Beard
2013 Journalism and Communication Monographs  
This historical monograph addresses a gap in the extensive scholarly research literature devoted to comparative advertising-especially that which contrasts the advertised product, service, or brand with  ...  By synthesizing the extensive theoretical and empirical research literature on comparative advertising and interpreting those findings from a historical perspective, this monograph offers uniquely significant  ...  When an advertiser states in his advertising that "most other products of this type" have grievous faults, sometimes positively serious, to what extent does he damage both his worthy competitors and the  ... 
doi:10.1177/1522637913486092 fatcat:anszecrbcned7lc5aiad66pxjm

Information politics: liberation and exploitation in the digital society

2015 ChoiceReviews  
By doing this you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this.  ...  , a tangible network of code, applications, wires, and radio waves ...  ... 
doi:10.5860/choice.192748 fatcat:5pg4tuexzjastgaw5eawzzwzfa

Artificial Intelligence [article]

John Paul Mueller Luca Massaron
2018 Zenodo  
So, the best way to start this book is to define what AI actually is, what it isn't, and how it connects to computers today  ...  In addition, the human tendency to anthropomorphize (give human characteristics to) technology makes it seem as if AI must do more than it can hope to accomplish.  ...  Think of the entropy as a measure of the mess in data: The less mess, the more order, and the easier it is to guess the right class.  ... 
doi:10.5281/zenodo.5599660 fatcat:rn6nyx5xinehzpwfy3knurtzgy

Special Issue: Engineering and Applications of Software Agents

Amelia B˘ Adic˘, Zoran Budimac, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina, Vladimir Batagelj, Slovenia (+17 others)
2016 unpublished
Changes in the Editorial Board are confirmed by the Executive Editors.  ...  Each author is guaranteed to receive the reviews of his article.  ...  We would like to thank all the reviewers for their restless reviewing effort and valuable feedback and all the authors who submitted their contributions to WASA'2013, as well as to this Special Issue.  ... 
fatcat:5sr3s3ousvf7naq3u5lil5ax6e

Ethical and Methodological Issues in Gang Ethnography in the Digital Age: Lessons from Four Studies in an Emerging Field [chapter]

Marta-Marika Urbanik, Robby Roks, Michelle Lyttle Storrod, James Densley
2020 Gangs in the Era of Internet and Social Media  
It's not some of the kids fault, because of how they were raised, and what they grew up into."  ...  From 2008 to 2010, the Nokia and Motorola flip phones in the pockets of my interviewees became iPhones, Androids, and BlackBerrys (coined "Crackberrys" because they were so addictive).  ...  Chapter 14 Moral Disengagement and Gangs Miriam Dyberg-Tengroth and Vincent Egan Moral psychology is the application of psychology to morality.  ... 
doi:10.1007/978-3-030-47214-6_2 fatcat:r6q4zplcbnc63b46lgkx76iz3u

In 2016 – How it felt to live in the Arab World five years after the "Arab Spring"

Albrecht Hofheinz (ed.), Stephan Guth (ed.)
2022 Journal of Arabic and Islamic studies  
NB: Preliminary pagination, subject to change due to scheduled additions.  ...  Suspect Foreigner (E Chitihh) • Tourist Resorts (C Pardey) • Uber (T Pepe) • Valentine's Day (A Kreil, R Ben Othmen) • The Voice from Above (S Guth, M Yordanova) • Zaḥma (W Armbrust) Codes: Beautiful  ...  Stunned, they now discover that they have been quietly removed from the new school atlas. Why this sudden change?  ... 
doi:10.5617/jais.9464 fatcat:foviyqo24bhivdnjfhhamkzwgq

JSE 27:3 Fall 2013 WHOLE ISSUE

Kathleen E Erickson
2013 Journal of Scientific Exploration  
Acknowledgments The author expresses his thanks to Prof. Dr. Th  ...  Acknowledgements Preparation of this article was supported by a grant from the Bial Foundation. The authors thank Fiona Permezel for her assistance in recruiting some participants.  ...  Does evolution proceed purely by "natural selection" from random mutations and accidental environmental changes?  ... 
doaj:d348858cce16494d848af2794dcff33d fatcat:caowryjw4fci7jede376ol6rsi
« Previous Showing results 1 — 15 out of 70 results