A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hints and Principles for Computer System Design
[article]
2021
arXiv
pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas. ...
This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate ...
If the text file gets messed up, you can edit it with ed. The schema keeps the database from being messed up too badly. ...
arXiv:2011.02455v3
fatcat:jolyz5lknjdbpjpxjcrx5rh6fa
Concurrent Computing in the Many-core Era (Dagstuhl Seminar 15021)
2015
Dagstuhl Reports
This seminar is a successor to Dagstuhl Seminars 08241 "Transactional memory: From implementation to application" and 12161 "Abstractions for scalable multicore computing", respectively held in June 2008 ...
and potential uses of emerging hardware support for synchronization extensions, and (3) considering the increasing complexity resulting from the explosion in heterogeneity. ...
Multiple users, variety of devices, access to my workspace from all devices (and ability to run code on all these devices). ...
doi:10.4230/dagrep.5.1.1
dblp:journals/dagstuhl-reports/PhilippsenFSM15
fatcat:owcmta65hzb5vmglwq3dwzbehy
Signs of Appropriation: A Semiotic Account of Breakdowns with IoT Technology
2019
Journal of Interactive Systems
We propose that, together, they have the potential to support productive decision making by IoT designers, as well as to raise new research questions on the topic. ...
By using semiotic theory and thematic analysis to investigate data from diaries, questionnaires and interviews collected from a group of eleven participants, we characterized IoT appropriation as interpretive ...
Volkmar Pipek from the University of Siegen for the collaboration and insightful discussions. ...
doi:10.5753/jis.2019.550
fatcat:fdxd7tefkjabpow5nckmq77v4q
Using complexity to protect elections
2010
Communications of the ACM
There is no practical, affordable way to mask the failures from the applications. ...
The byte-code instructions x load and xstore access memory to read from and write to fields of objects, respectively (x changes depending on the type of the field). ...
All application material should be sent by e-mail to search@ cs.appstate.edu in a single PDF file attachment or by mail to the chair of the search committee: Dr. ...
doi:10.1145/1839676.1839696
fatcat:hbqpm5boabe3jcpa4jcs7czf6y
The `Chicken and Egg' of Subjective and Social Factors in Desistance from Crime
2008
European Journal of Criminology
The main reason for this change is to make the journal more easily accessible and therefore, we hope and expect, much more widely read. Do please tell all your friends and colleagues the good news! ...
As she writes in her introduction, we believe this to be the first journal ever to devote an entire issue to contributions made by people who have desisted from offending, some of whom may indeed describe ...
It was like the purpose of orientation was to mold us into androids. However, in the actual prison culture, the rules of the institution were disregarded and there was a series of unwritten rules. ...
doi:10.1177/1477370807087640
fatcat:7g7y7p5fvbdsfnugxkx4relyx4
Mapping The Drowned World
2017
Cartographic Perspectives
The result is too different from the SSSS and fabric cones even if it worked. Suggested modifications: Return to stitching in whole structures from the beginning. ...
Try adding the bulk of them much later (after stopping SSSS). ...
fears of the Cold War and the present, because it does seem to predict climate change. ...
doi:10.14714/cp85.1401
fatcat:bekjjnvrsjfmlnjd4sdowgwhgm
OSTP-AWhite House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence
2017
Figshare
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence ...
fraction of the populace simply does not have (nor can easily be given) skills of significant economic value. ...
); we also support AI safetyrelevant research agendas from MIRI (https://intelligence.org/files/TechnicalAgenda.pdf) and as suggested in . ...
doi:10.6084/m9.figshare.4640305
fatcat:26aelpe4ejbupao5yh2mys2pzq
"No Country for E-Lit?" – India and Electronic Literature
2017
Hyperrhiz
oriented towards everyday lifestyle applications. ...
I went to the kabari (scrap dealer) shop in my lane and bought a cycle rim. Then, went up to my roof, removed the wire from the antenna and tied it to the cycle rim. ...
The material may vary from newsprint to video to sound to binary code, or a combination of the same, and the journal may transmogrify from being a witness, to a participant in that which is being recorded ...
doi:10.20415/hyp/016.e08
fatcat:ik7x2ivbxjdljoxfh4pyk3vt3y
A History of Comparative Advertising in the United States
2013
Journalism and Communication Monographs
This historical monograph addresses a gap in the extensive scholarly research literature devoted to comparative advertising-especially that which contrasts the advertised product, service, or brand with ...
By synthesizing the extensive theoretical and empirical research literature on comparative advertising and interpreting those findings from a historical perspective, this monograph offers uniquely significant ...
When an advertiser states in his advertising that "most other products of this type" have grievous faults, sometimes positively serious, to what extent does he damage both his worthy competitors and the ...
doi:10.1177/1522637913486092
fatcat:anszecrbcned7lc5aiad66pxjm
Information politics: liberation and exploitation in the digital society
2015
ChoiceReviews
By doing this you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this. ...
, a tangible network of code, applications, wires, and radio waves ... ...
doi:10.5860/choice.192748
fatcat:5pg4tuexzjastgaw5eawzzwzfa
Artificial Intelligence
[article]
2018
Zenodo
So, the best way to start this book is to define what AI actually is, what it isn't, and how it connects to computers today ...
In addition, the human tendency to anthropomorphize (give human characteristics to) technology makes it seem as if AI must do more than it can hope to accomplish. ...
Think of the entropy as a measure of the mess in data: The less mess, the more order, and the easier it is to guess the right class. ...
doi:10.5281/zenodo.5599660
fatcat:rn6nyx5xinehzpwfy3knurtzgy
Special Issue: Engineering and Applications of Software Agents
2016
unpublished
Changes in the Editorial Board are confirmed by the Executive Editors. ...
Each author is guaranteed to receive the reviews of his article. ...
We would like to thank all the reviewers for their restless reviewing effort and valuable feedback and all the authors who submitted their contributions to WASA'2013, as well as to this Special Issue. ...
fatcat:5sr3s3ousvf7naq3u5lil5ax6e
Ethical and Methodological Issues in Gang Ethnography in the Digital Age: Lessons from Four Studies in an Emerging Field
[chapter]
2020
Gangs in the Era of Internet and Social Media
It's not some of the kids fault, because of how they were raised, and what they grew up into." ...
From 2008 to 2010, the Nokia and Motorola flip phones in the pockets of my interviewees became iPhones, Androids, and BlackBerrys (coined "Crackberrys" because they were so addictive). ...
Chapter 14 Moral Disengagement and Gangs Miriam Dyberg-Tengroth and Vincent Egan Moral psychology is the application of psychology to morality. ...
doi:10.1007/978-3-030-47214-6_2
fatcat:r6q4zplcbnc63b46lgkx76iz3u
In 2016 – How it felt to live in the Arab World five years after the "Arab Spring"
2022
Journal of Arabic and Islamic studies
NB: Preliminary pagination, subject to change due to scheduled additions. ...
Suspect Foreigner (E Chitihh) • Tourist Resorts (C Pardey) • Uber (T Pepe) • Valentine's Day (A Kreil, R Ben Othmen) • The Voice from Above (S Guth, M Yordanova) • Zaḥma (W Armbrust) Codes: Beautiful ...
Stunned, they now discover that they have been quietly removed from the new school atlas. Why this sudden change? ...
doi:10.5617/jais.9464
fatcat:foviyqo24bhivdnjfhhamkzwgq
JSE 27:3 Fall 2013 WHOLE ISSUE
2013
Journal of Scientific Exploration
Acknowledgments The author expresses his thanks to Prof. Dr. Th ...
Acknowledgements Preparation of this article was supported by a grant from the Bial Foundation. The authors thank Fiona Permezel for her assistance in recruiting some participants. ...
Does evolution proceed purely by "natural selection" from random mutations and accidental environmental changes? ...
doaj:d348858cce16494d848af2794dcff33d
fatcat:caowryjw4fci7jede376ol6rsi
« Previous
Showing results 1 — 15 out of 70 results