Browse Items (55 total)

  • Collection: 000 Computer Science, Knowledge & Systems

SymmetryAdapted_Machine_Learning_for_Information_Security_cover.jpg
Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing…

1002212.pdf.jpg
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In…

The Impact Challenge.jpg
This book explores the role of businesses in delivering positive societal and financial outcomes as they seek to bridge the gap between short-term organizational behaviors and long-range sustainability commitments. By addressing the inevitable data…

The Philosophy of Online Manipulation.jpg
Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online?

This volume…

Trading Zones of Digital History.jpg
Will historians become programmers? How do historians collaborate with experts from computational domains? At the centre of the book is the question how historians are affected by such ongoing interactions. By following historians and studying…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2