Information theory Books
Cambridge University Press Dive Into Deep Learning
Book SynopsisThis approachable text teaches all the concepts, the context, and the code needed to understand deep learning. Suitable for students and professionals, the book doesn't require any previous background in machine learning or deep learning. Interactive examples feature throughout, with runnable code and executable Jupyter notebooks available online.Trade Review'In less than a decade, the AI revolution has swept from research labs to broad industries to every corner of our daily life. Dive into Deep Learning is an excellent text on deep learning and deserves attention from anyone who wants to learn why deep learning has ignited the AI revolution: the most powerful technology force of our time.' Jensen Huang, Founder and CEO, NVIDIA'This is a timely, fascinating book, providing not only a comprehensive overview of deep learning principles but also detailed algorithms with hands-on programming code, and moreover, a state-of-the-art introduction to deep learning in computer vision and natural language processing. Dive into this book if you want to dive into deep learning!' Jiawei Han, Michael Aiken Chair Professor, University of Illinois at Urbana-Champaign'This is a highly welcome addition to the machine learning literature, with a focus on hands-on experience implemented via the integration of Jupyter notebooks. Students of deep learning should find this invaluable to become proficient in this field.' Bernhard Schölkopf,, Director, Max Planck Institute for Intelligent Systems'Dive into Deep Learning strikes an excellent balance between hands-on learning and in-depth explanation. I've used it in my deep learning course and recommend it to anyone who wants to develop a thorough and practical understanding of deep learning.' Colin Raffel, Assistant Professor, University of North Carolina, Chapel HillTable of ContentsInstallation; Notation; 1. Introduction; 2. Preliminaries; 3. Linear neural networks for regression; 4. Linear neural networks for classification; 5. Multilayer perceptrons; 6. Builders guide; 7. Convolutional neural networks; 8. Modern convolutional neural networks; 9. Recurrent neural networks; 10. Modern recurrent neural networks; 11. Attention mechanisms and transformers; Appendix. Tools for deep learning; Bibliography; Index.
£24.99
Random House USA Inc The Black Swan Second Edition
Book SynopsisThe most influential book of the past seventy-five years: a groundbreaking exploration of everything we know about what we donâ??t know, now with a new section called â??On Robustness and Fragility.â?A black swan is a highly improbable event with three principal characteristics: It is unpredictable; it carries a massive impact; and, after the fact, we concoct an explanation that makes it appear less random, and more predictable, than it was. The astonishing success of Google was a black swan; so was 9/11. For Nassim Nicholas Taleb, black swans underlie almost everything about our world, from the rise of religions to events in our own personal lives. Why do we not acknowledge the phenomenon of black swans until after they occur? Part of the answer, according to Taleb, is that humans are hardwired to learn specifics when they should be focused on generalities. We concentrate on things we already know and time and time again fail to take into consideration what we d
£15.00
Penguin Books Ltd The Black Swan
Book SynopsisThe phenomenal international bestseller that shows us how to stop trying to predict everything - and take advantage of uncertaintyWhat have the invention of the wheel, Pompeii, the Wall Street Crash, Harry Potter and the internet got in common? Why are all forecasters con-artists? Why should you never run for a train or read a newspaper? This book is all about Black Swans: the random events that underlie our lives, from bestsellers to world disasters. Their impact is huge; they''re impossible to predict; yet after they happen we always try to rationalize them. ''Taleb is a bouncy and even exhilarating guide ... I came to relish what he said, and even develop a sneaking affection for him as a person'' Will Self, Independent on Sunday''He leaps like some superhero of the mind'' Boyd Tonkin, IndependentTrade ReviewA fascinating study of how we are regularly taken for suckers by the unexpected * Guardian *Like the conversation of a raconteur ... hugely enjoyable - compelling * Financial Times *It has altered modern thinking * The Times *Confirms his status as a guru for every would-be Damien Hirst, George Soros and aspirant despot * Sunday Times *The Black Swan changed my view of how the world works -- Daniel Kahneman, author of Thinking, Fast and SlowGreat fun... brash, stubborn, entertaining, opinionated, curious, cajoling -- Stephen J. Dubner, co-author of FreakonomicsThe most prophetic voice of all * GQ *
£12.34
Cambridge University Press How to Prove It
Book SynopsisProofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text''s third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed ''scratch work'' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this booTrade Review'Not only does this book help students learn how to prove results, it highlights why we care so much. It starts in the introduction with some simple conjectures and gathering data, quickly disproving the first but amassing support for the second. Will that pattern persist? How can these observations lead us to a proof? The book is engagingly written, and covers - in clear and great detail - many proof techniques. There is a wealth of good exercises at various levels. I've taught problem solving before (at The Ohio State University and Williams College), and this book has been a great addition to the resources I recommend to my students.' Steven J. Miller, Williams College, Massachusetts'This book is my go-to resource for students struggling with how to write mathematical proofs. Beyond its plentiful examples, Velleman clearly lays out the techniques and principles so often glossed over in other texts.' Rafael Frongillo, University of Colorado, Boulder'I've been using this book religiously for the last eight years. It builds a strong foundation in proof writing and creates the axiomatic framework for future higher-level mathematics courses. Even when teaching more advanced courses, I recommend students to read chapter 3 (Proofs) since it is, in my opinion, the best written exposition of proof writing techniques and strategies. This third edition brings a new chapter (Number Theory), which gives the instructor a few more topics to choose from when teaching a fundamental course in mathematics. I will keep using it and recommending it to everyone, professors and students alike.' Mihai Bailesteanu, Central Connecticut State University'Professor Velleman sets himself the difficult task of bridging the gap between algorithmic and proof-based mathematics. By focusing on the basic ideas, he succeeded admirably. Many similar books are available, but none are more treasured by beginning students. In the Third Edition, the constant pursuit of excellence is further reinforced.' Taje Ramsamujh, Florida International University'Proofs are central to mathematical development. They are the tools used by mathematicians to establish and communicate their results. The developing mathematician often learns what constitutes a proof and how to present it by osmosis. How to Prove It aims at changing that. It offers a systematic introduction to the development, structuring, and presentation of logical mathematical arguments, i.e. proofs. The approach is based on the language of first-order logic and supported by proof techniques in the style of natural deduction. The art of proving is exercised with naive set theory and elementary number theory throughout the book. As such, it will prove invaluable to first-year undergraduate students in mathematics and computer science.' Marcelo Fiore, University of Cambridge'Overall, this is an engagingly-written and effective book for illuminating thinking about and building a careful foundation in proof techniques. I could see it working in an introduction to proof course or a course introducing discrete mathematics topics alongside proof techniques. As a self-study guide, I could see it working as it so well engages the reader, depending on how able they are to navigate the cultural context in some examples.' Peter Rowlett, LMS Newsletter'Altogether this is an ambitious and largely very successful introduction to the writing of good proofs, laced with many good examples and exercises, and with a pleasantly informal style to make the material attractive and less daunting than the length of the book might suggest. I particularly liked the many discussions of fallacious or incomplete proofs, and the associated challenges to readers to untangle the errors in proofs and to decide for themselves whether a result is true.' Peter Giblin, University of Liverpool, The Mathematical GazetteTable of Contents1. Sentential logic; 2. Quantificational logic; 3. Proofs; 4. Relations; 5. Functions; 6. Mathematical induction; 7. Number theory; 8. Infinite sets.
£34.19
£19.95
Gingko Press The Medium is the Massage
Book Synopsis
£12.71
Manning Publications Self-Sovereign Identity: Decentralized digital
Book Synopsis"This book is a comprehensive roadmap to the most crucial fix for today's broken Internet." - Brian Behlendorf, GM for Blockchain, Healthcare and Identity at the Linux Foundation In a world of changing privacy regulations, identity theft, and online anonymity, identity is a precious and complex concept. Self-Sovereign Identity (SSI) is a set of technologies that move control of digital identity from third party “identity providers”directly to individuals, and it promises to be one of the most important trendsfor the coming decades. Now in Self-Sovereign Identity, privacy and personal data experts Drummond Reed and Alex Preukschat lay out a roadmap for a futureof personal sovereignty powered by the Blockchain and cryptography. Cutting through the technical jargon with dozens of practical use cases from experts across all major industries, it presents a clear and compelling argument for why SSI is a paradigm shift, and shows how you can be ready to be prepared forit. about the technology Trust onthe internet is at an all-time low. Large corporations and institutions control our personal data because we've never had a simple, safe, strong way to prove who we are online. Self-sovereign identity (SSI) changes all that. about the book In Self-Sovereign Identity: Decentralized digital identity and verifiable credentials, you'll learn how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. It combines a clear, jargon-free introduction to this blockchain-inspired paradigm shift with interesting essays written by its leading practitioners. Whether for property transfer, ebanking, frictionless travel, or personalized services, the SSI model for digital trust will reshape our collective future. what's inside · The architecture of SSI software and services · The technical, legal, and governance concepts behind SSI · How SSI affects global business industry-by-industry · Emerging standards for SSI about the reader For technology and business readers. No prior SSI, cryptography, or blockchain experience required. aboutthe author Drummond Reed is the Chief Trust Officer at Evernym, a technology leader in SSI. Alex Preukschat is the co-founder of SSIMeetup.org and AlianzaBlockchain.org. Trade Review“This book is a comprehensive roadmap to the most crucial fix for today's broken Internet.” Brian Behlendorf, GM for Blockchain, Healthcare and Identity at the Linux Foundation “If trusted relationships over the Internet are important to youor your business, this book is for you.” John Jordan, Executive Director,Trust over IP Foundation “Decentralized identity represents not only a wide range of trust-enabling technologies, but also a paradigm shift in our increasingly digital-first world.” Rouven Heck, Executive Director, Decentralized Identity Foundation
£39.99
Cambridge University Press Mining of Massive Datasets
Written by leading authorities in database and Web technologies, this book is essential reading for students and practitioners alike. The popularity of the Web and Internet commerce provides many extremely large datasets from which information can be gleaned by data mining. This book focuses on practical algorithms that have been used to solve key problems in data mining and can be applied successfully to even the largest datasets. It begins with a discussion of the MapReduce framework, an important tool for parallelizing algorithms automatically. The authors explain the tricks of locality-sensitive hashing and stream-processing algorithms for mining data that arrives too fast for exhaustive processing. Other chapters cover the PageRank idea and related tricks for organizing the Web, the problems of finding frequent itemsets, and clustering. This third edition includes new and extended coverage on decision trees, deep learning, and mining social-network graphs.
£64.99
Facet Publishing Interactive Information Seeking, Behaviour and
Book SynopsisInformation retrieval (IR) is a complex human activity supported by sophisticated systems. Information science has contributed much to the design and evaluation of previous generations of IR system development and to our general understanding of how such systems should be designed and yet, due to the increasing success and diversity of IR systems, many recent textbooks concentrate on IR systems themselves and ignore the human side of searching for information. This book is the first text to provide an information science perspective on IR. Unique in its scope, the book covers the whole spectrum of information retrieval, including: history and background information behaviour and seeking task-based information searching and retrieval approaches to investigating information interaction and behaviour information representation access models evaluation interfaces for IR interactive techniques web retrieval, ranking and personalization recommendation, collaboration and social search multimedia: interfaces and access. Readership: Senior undergraduates and masters’ level students of all information and library studies courses and practising LIS professionals who need to better appreciate how IR systems are designed, implemented and evaluated.Trade Review"This book is a must if one is a student or researcher new to information science and, in particular, to information retrieval (IR) interaction and multimedia research." -- Journal of the American Society for Information Science and Technology"This is an interesting collection that deserves to be adopted as a key text within information science courses. Award-winning, internationally renowned editors have enticed a number of experts, some with industry experience, to provide high-quality contributions. The solid chapters discussing core fields that make up its coverage – information seeking, information behaviour,information retrieval – assure its place on reading lists. The editors have ensured new developments receive attention but not at the expense of the essentials of the fields." -- Journal of Information LiteracyTable of ContentsForeword - Tefko Saracevic 1. Interactive information retrieval: history and background - Colleen Cool and Nicholas J. Belkin 2. Information behavior and seeking - Peiling Wang 3. Task-based information searching and retrieval - Elaine G. Toms 4. Approaches to investigating information interaction and behaviour - Raya Fidel 5. Information representation - Mark D. Smucker 6. Access models - Edie Rasmussen 7. Evaluation - Kalervo Järvelin 8. Interfaces for information retrieval - Max Wilson 9. Interactive techniques - Ryen W. White 10. Web retrieval, ranking and personalization - Jaime Teevan and Susan Dumais 11. Recommendation, collaboration and social search - David M. Nichols and Michael B. Twidale 12. Multimedia: behaviour, interfaces and interaction - Haiming Liu, Suzanne Little and Stefan Rüger 13. Multimedia: information representation and access - Suzanne Little, Evan Brown and Stefan Rüger
£61.75
Random House Publishing Group Nexus
Book Synopsis
£22.91
John Wiley & Sons Inc Data Governance For Dummies
Book SynopsisTable of ContentsIntroduction 1 Part 1: Data Everywhere 5 Chapter 1: Defining Data Governance 7 Chapter 2: Exploring a World Awash in Data 23 Chapter 3: Driving Value through Data 41 Chapter 4: Transforming through Data 55 Part 2: Delivering Data Governance 75 Chapter 5: Building the Business Case for Data Governance 77 Chapter 6: Focusing on the Fundamentals of Data Governance 91 Part 3: Developing Data Governance 105 Chapter 7: Establishing Data Governance Objectives 107 Chapter 8: Identifying Data Governance Roles and Responsibilities 121 Chapter 9: Designing a Data Governance Program 139 Chapter 10: Deploying a Data Governance Program 157 Part 4: Democratizing Data 183 Chapter 11: Running a Successful Data Governance Program 185 Chapter 12: Measuring and Monitoring a Data Governance Program 209 Chapter 13: Responding to Data Governance Challenges and Risks. 227 Part 5: The Part of Tens 243 Chapter 14: Ten Data Governance Best Practices 245 Chapter 15: Ten Essential Data Governance Stakeholders 255 Index 263
£19.99
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Understanding Cryptography: A Textbook for
Book SynopsisCryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.The authors' website (http://www.crypto-textbook.com/) provides extensive notes, slides, video lectures; the authors' YouTube channel (https://www.youtube.com/channel/UC1usFRN4LCMcflV7UjHNuQg) includes video lectures.Trade ReviewFrom the reviews: "The authors have succeeded in creating a highly valuable introduction to the subject of applied cryptography. I hope that it can serve as a guide for practitioners to build more secure systems based on cryptography, and as a stepping stone for future researchers to explore the exciting world of cryptography and its applications." (Bart Preneel, K.U.Leuven) "The material is very well presented so it is clear to understand. The necessary amount of mathematics is used and complete yet simple examples are used by the authors to help the reader understand the topics. ... [The authors] appear to fully understand the concepts and follow a very good pedagogical process that helps the reader not only understand the different topics but motivate you to perform some of the exercises at the end of each chapter and browse some of the reference materials. I fully recommend this book to any software developer/designer working or considering working on a project that requires security." (John Canessa) "The book presents a panoramic of modern Cryptography with a view to practical applications. ... The book is well written, many examples and figures through it illustrate the theory and the book's website offers links and supplementary information. The book also discusses the implementation in software and hardware of the main algorithms described." (Juan Tena Ayuso, Zentralblatt MATH, Vol. 1190, 2010)Table of ContentsIntroduction to Cryptography and Data Security.- Stream Ciphers.- The Data Encryption Standard (DES) and Alternatives.- The Advanced Encryption Standard (AES).- More About Block Ciphers.- to Public-Key Cryptography.- The RSA Cryptosystem.- Public-Key Cryptosystems Based on the Discrete Logarithm Problem.- Elliptic Curve Cryptosystems.- Digital Signatures.- Hash Functions.- Message Authentication Codes (MACs).- Key Establishment.
£29.69
Emerald Publishing Limited Mathematical and Economic Theory of Road Pricing
Book SynopsisProvides the methodological advances in applying advanced modeling techniques to road pricing. This book discusses topics such as: fundamentals of traffic equilibrium problems; principle of marginal-cost road pricing; models and algorithms for the general second-best road pricing problems; social and spatial equities; Pareto pricing; and more.Trade ReviewRoad pricing is an idea whose time has come. As we invoke new information and computer technologies to monitor, manage and operate or transportation systems more efficiently and effectively, and as we wrestle with significant and growing problems of environment, congestion, energy and equity affecting urban transport, new and alternative solutions are needed. We have to make urban transportation more sustainable, more responsive, and more intelligent. Road pricing is one approach to achieving these goals, a smarter way of running a transportation system. Whilst the concepts and constructs of road pricing have been well known for some time, the methods and technology to employ them have only recently arrived, and the socio-political will to implement road pricing is just beginning to appear. Professor Yang is one of the world's leading transportation scientists and has devoted his recent research to the topic of road pricing, leading to the development of theories and models for analysing and optimising the likely impacts of road pricing schemes, and to methods for selecting the appropriate scheme for a given urban area. This book provides a coherent, in-depth and intelligible treatment of the topic, drawing on Professor Yangs extensive research, knowledge and understanding. Its account of the topic, its history, capabilities and complexities, and alternative approaches and potential for application to cities around the world will be of interest to transportation engineers and planners, both in research and practice. It is set to become a seminal work on road pricing and will be of value to academics, researchers, policy analysts and students in transportation engineering and planning. Professor M.A.P. Taylor, University of South AustraliaTable of ContentsIntroduction. Fundamentals of User-Equilibrium Problems. The First-Best Road Pricing Problems. The Second-Best Road Pricing Problems: A Sensitivity Analysis Based Approach. The Second-Best Road Pricing Problems: A Gap Function Based Approach. Discriminatory and Anonymous Road Pricing. Social and Spatial Equities and Revenue Redistribution. Pricing, Capacity Choice and Financing. Simultaneous Determination of Optimal Toll Levels and Locations. Sequential Pricing Experiments with Limited Information. Bounding the Efficiency Gain or Loss of Road Pricing. Dynamic Road Pricing: Single and Parallel Bottleneck Models. Dynamic Road Pricing: General Network Models.
£129.19
Oxford University Press Information Ecology
Book SynopsisAccording to virtually every business writer, we are in the midst of a new information age, one that will revolutionize how workers work, how companies compete, perhaps even how thinkers think. And it is certainly true that Information Technology has become a giant industry. In America, more that 50% of all capital spending goes into IT, accounting for more than a third of the growth of the entire American economy in the last four years. Over the last decade, IT spending in the U.S. is estimated at 3 trillion dollars. And yet, by almost all accounts, IT hasn''t worked all that well. Why is it that so many of the companies that rave invested in these costly new technologies never saw the returns they had hoped for? And why do workers, even CEOs, find it so hard to adjust to new IT systems? In Information Ecology, Thomas Davenport proposes a revolutionary new way to look at information management, one that takes into account the total information environment within an organization. ArguiTrade Review"An important, must-read book about managers and their information needs."--F.Warren McFarlan, Albert H. Gordon Professor of Business Administration, Harvard University"Information Ecology defines mobilization for the future, a topic that is clearly thought provoking and one that we must all address if true information technology return on investment is to occur."--Ralph J. Szygenda, Vice President and Chief Executive Officer, General Motors Corporation'...a timely corrective to the technophile culture that has dominated the field of information to date...an informative book for those who want to manage information and not just IT to the best effect within both business and healthcare.' * Chris Atkinson, British Jnl of Healthcare Computing & Information Management, vol.15, Number 5 *A well argued , and well presented, case that needs to be read by all those wrestling with this critical subject. - Stuart MacDonald - Long Range Planning Vol 31 Oct 1988
£57.00
Oxford University Press The Ethics of Information
Book SynopsisLuciano Floridi develops an original ethical framework for dealing with the new challenges posed by Information and Communication Technologies (ICTs). ICTs have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, health care, industrial production and business, social relations, and conflicts. They have had a radical and widespread impact on our moral lives and on contemporary ethical debates. Privacy, ownership, freedom of speech, responsibility, technological determinism, the digital divide, and pornography online are only some of the pressing issues that characterise the ethical discourse in the information society. They are the subject of Information Ethics (IE), the new philosophical area of research that investigates the ethical impact of ICTs on human life and society. Since the seventies, IE has been a standard topic in many curricula. In recent years, there has been a flourishing of new university courses, international conferences, workshops, professional organizations, specialized periodicals and research centres. However, investigations have so far been largely influenced by professional and technical approaches, addressing mainly legal, social, cultural and technological problems. This book is the first philosophical monograph entirely and exclusively dedicated to it. Floridi lays down, for the first time, the conceptual foundations for IE. He does so systematically, by pursuing three goals: a) a metatheoretical goal: it describes what IE is, its problems, approaches and methods;b) an introductory goal: it helps the reader to gain a better grasp of the complex and multifarious nature of the various concepts and phenomena related to computer ethics;c) an analytic goal: it answers several key theoretical questions of great philosophical interest, arising from the investigation of the ethical implications of ICTs. Although entirely independent of The Philosophy of Information (OUP, 2011), Floridi''s previous book, The Ethics of Information complements it as new work on the foundations of the philosophy of information.Trade ReviewIn this groundbreaking work, Luciano Floridi builds the foundations of Information Ethics (IE) by arguing that an informational interpretation of reality is required due to our increased reliance on information and communication technologies (ICTs) for our well-being and success. * Brendan Rowe, The Review of Metaphysics *Floridi's book challenges standard ethics. In standard ethics, life has priority in moral evaluation. However, in Floridi's Information Ethics, information systems are equal in moral value to living systems. Floridi develops his Ethics as part of a new ontological theory of the Infosphere. * Sheldon Richmond, Dialogue: Canadian Philosophical Review *Table of ContentsPREFACE ; 1. ETHICS AFTER THE INFORMATION REVOLUTION ; 2. WHAT IS INFORMATION ETHICS? ; 3. THE METHOD OF ABSTRACTION ; 4. INFORMATION ETHICS AS E-NVIRONMENTAL ETHICS ; 5. INFORMATION ETHICS AND THE FOUNDATIONALIST DEBATE ; 6. THE INTRINSIC VALUE OF THE INFOSPHERE ; 7. THE MORALITY OF ARTIFICIAL AGENTS ; 8. THE CONSTRUCTIONIST VALUES OF HOMO POIETICUS ; 9. ARTIFICIAL EVIL ; 10. THE TRAGEDY OF THE GOOD WILL ; 11. THE INFORMATIONAL NATURE OF SELVES ; 12. THE ONTOLOGICAL INTERPRETATION OF INFORMATIONAL PRIVACY ; 13. DISTRIBUTED MORALITY ; 14. INFORMATION BUSINESS ETHICS ; 15. GLOBAL INFORMATION ETHICS ; 16. A DEFENCE OF INFORMATION ETHICS ; EPILOGUE ; REFERENCES ; INDEX
£34.99
Clarendon Press Every Thing Must Go
Book SynopsisEvery Thing Must Go argues that the only kind of metaphysics that can contribute to objective knowledge is one based specifically on contemporary science as it really is, and not on philosophers'' a priori intuitions, common sense, or simplifications of science. In addition to showing how recent metaphysics has drifted away from connection with all other serious scholarly inquiry as a result of not heeding this restriction, they demonstrate how to build a metaphysics compatible with current fundamental physics (''ontic structural realism''), which, when combined with their metaphysics of the special sciences (''rainforest realism''), can be used to unify physics with the other sciences without reducing these sciences to physics itself. Taking science metaphysically seriously, Ladyman and Ross argue, means that metaphysicians must abandon the picture of the world as composed of self-subsistent individual objects, and the paradigm of causation as the collision of such objects.Everything Trade ReviewThis material is dense, challenging and creative...a provovative book...the authors are to be commended for taking on the challenge to develop a systematic, scientifically informed metaphysics for the twenty-first century. * Paul W. Humphreys Metascience *This challenging and provocative book contends that contemporary fundamental physics carries radically counterintuitive consequences for metaphysics * Jarrett Leplin, Philosophical Papers *an enticing work * Jeremy Butterfield, Times Literary Supplement *Table of ContentsPreface ; 1. In Defence of Scientism ; 2. Scientific Realism, Constructive Empiricism and Structuralism ; 3. Ontic Structural Realism and the Philosophy of Physics ; 4. Rainforest Realism and the Unity of Science ; 5. Causation in a Structural World ; 6. Conclusion - Philosophy Enough ; Bibliography
£119.00
The University of Chicago Press The Economics of Attention Style and Substance
Book SynopsisIf economics is about the allocation of resources, then what is the most precious resource in our information economy? Certainly not information, for we are drowning in it. No, what we are short of is the attention to make sense of that information. This title traces our move from an economy of things and objects to an economy of attention.Trade Review"I personally find this head-smackingly insightful. Of course! Money may make the world go 'round, but it's attention that we increasingly sell, hoard, compete for, and fuss over....The real news is that just about all of us - whether we participate in the market as producers or consumers - live increasingly in the attention economy as well." - Andrew Cassel, Philadelphia Inquirer "Lanham's points are strong and well-researched....If style is going to increasingly operate as the decision-making arbiter, Lanham should be commended on his: clear, jargon-free, and forward-thinking." - Publishers Weekly "It's refreshing to read a deeply literary mind who embraces the information age, and wants to focus on its civilizing possibilities rather than flee from the screens in horror." - Pat Kane, Independent (UK)"
£18.00
The University of Chicago Press The Economics of Attention Style and Substance
Book SynopsisTraces our epochal move from an economy of things and objects to an economy of attention. According to the author, the central commodity in our new age of information is not stuff but style, for style is what competes for our attention amidst the din and deluge of new media. He aims to map the frontier that information technologies have created.Trade Review"In this heady glimpse at an electronic universe... [Lanham] maintains that digitized technology can democratize higher education, open up the arts to a full range of human talent and foster a convergence between the two cultures of science and the humanities." - Publishers Weekly "A cohesive and engaging overview of the challenges introduced by electronic publishing upon traditional models of research, instruction, and even the nature of academic departments." - Library Journal"
£23.75
The University of Chicago Press Distant Horizons
Book SynopsisTrade Review"Distant Horizons not only proves that Ted Underwood is defining the field of cultural analytics as it emerges; it shows us why. Combining literary theory with a deep understanding of computational methods, this volume demonstrates and effectively argues that quantitative analysis is best used not to find objective truths but to explore perspectives, both historically local and theoretical. It is at once a primer for quantitative literacy and a historically sensitive exploration of gender, genre, character, and audience, putting paid once and for all to the notion that statistical methods have no place in hermeneutics."--Laura Mandell, author of Breaking the Book: Print Humanities in the Digital Age "Distant Horizons is of compelling interest to digital humanists. But its true audience is a wider society of literary and other humanities scholars spanning across fields, periods, approaches, and levels. For this larger audience, Ted Underwood goes out of his way to make distant reading accessible, inviting, and persuasive. This innovative book is the breakout work digital humanists have been waiting for, and it is positioned to be a landmark work in literary scholarship at large."--Alan Liu, author of Friending the Past: The Sense of History in the Digital Age
£22.80
University of Chicago Press Planning as Persuasive Storytelling The
Book SynopsisThis study looks at the world of political conflict surrounding the Commonwealth Edison Company's nuclear power plant construction programme in northern Illinois during the 1980s. It examines the theory that planning can best be thought of as a form of persuasive storytelling.Table of ContentsList of Illustrations List of Tables Preface Acknowledgments Prelude: A Strange Place, an Alien Language 1: The Irony of Modernist Planning 2: The Argumentative or Rhetorical Turn in Planning 3: The Modernist Institution and Rhetoric of Regulated Natural Monopoly 4: Commonwealth Edison's Ambitious Nuclear Power Expansion Plan, 1973- 1986 5: The Best Deal for Illinois Consumers? Assessing Commonwealth Edison's "Negotiated Settlement" 6: Edison Completes Its Nuclear Power Expansion Plan, But Who Will Pay for the Last of It? 7: Precinct Captains at the Nuclear Switch? Exploring Chicago's Electric Power Options 8: Survey Research as a Trope in Electric Power Planning Arguments 9: Precinct Captains at the Nuclear Switch? The Mayor's Hand Turns up Empty 10: Frozen in a Passionate Embrace: Allocating Pain, Allocating Blame 11: The Plateau in the Web: Planning as Persuasive Storytelling within a Web of Relationships Postlude: E-mail to a Friend Notes References Illustration Credits Index
£104.00
The University of Chicago Press Planning as Persuasive Storytelling
Book SynopsisThis study looks at the world of political conflict surrounding the Commonwealth Edison Company's nuclear power plant construction programme in northern Illinois during the 1980s. It examines the theory that planning can best be thought of as a form of persuasive storytelling.
£28.50
University of Illinois Press How to Think about Information
Book SynopsisThe history and theory of information as a commodity in the contemporary world Trade Review"How to Think About Information is a critically important book. . . . Schiller provides fundamentally important insights into the infrastructural and superstructural demands of commodification."--Global Media and Communication"Dan Schiller's oeuvre is clear and one that scholars must acknowledge if they deem themselves fit to reflect on the character of the information age."--European Journal of Comunication"Dan Schiller is today probably the most lucid and critical scholar writing on the structure and history of communication and information systems--not just in the U.S., by the way--and this book demonstrates that in spades. He unites his usual clarity of vision of the present with his always-insightful examination and interpretation of communication history. This work will be another significant advancement of our knowledge, informing not just academic curiosity but also how we ought to think and rethink public policy that is shaping information and media today."--Richard Maxwell, professor of media studies, Queens College, City University of New York"Read this book and you will never look at media convergence the same way again. By tracking business trends across media and telecom industries, Schiller demonstrates how much has been lost while citizens have been lulled by the discourses of globalization, deregulation, and the technology boom. Schiller's dazzling research and cogent argument make this book unforgettable."--Ellen Seiter, Stephen K. Nenno Professor of Television Studies, University of Southern California"With a formidable command of knowledge in seemingly disparate fields and a truly transnational perspective, Dan Schiller cuts beneath the theoretical debates about information society and sifts through historical records and today's headlines to reveal the overarching logic of informationalized capitalism. The result is a profound, incisive and essential book for anybody interested in the contemporary world and the role of information in it."--Yuezhi Zhao, Canada Research Chair in Political Economy of Global Communication, Simon Fraser University
£18.89
University of Texas Press Intercultural Communication
Book SynopsisAn authoritative, practical guide for deciphering and following the rules that govern cultures, with a demonstration of how these rules apply to the communication issues that exist between the United States and Mexico.Table of Contents Preface Acknowledgments Part I. The Global Perspective of Intercultural Communication 1. Why Communicate across Cultures? 2. What Constitutes a Culture? 3. Obstacles of Perception 4. Obstacles in Verbal Processes 5. Obstacles in Nonverbal Processes Part II. Two Worlds: The United States and Mexico 6. The Mexico-United States Cultural Environment 7. Some Mexico-United States Cultural Issues 8. Day-to-Day Cultural Interaction Part III. Conclusion 9. Transcending Culture Appendix: Author's Note Glossary Notes Bibliography Index About the Author
£17.99
Bloomsbury Publishing (UK) Multimodal Discourse The Modes and Media of Contemporary Communication Hodder Arnold Publication
Book SynopsisGunther Kress, IOE, UCL's Faculty of Education and Society, University College London, UKTheo Van Leeuwen, Faculty of Humanities and Social Sciences, University of Technology Sydney, AustraliaTrade Review'Multimodal Discourse is the theoretical browser we need to navigate the exuberant multimodality of the highly mediated owrld in which we live. For students and specialists in communication or semiotics, cultural studies or linguistics, graphic design or anthropology this is the foundationla theory of how meaning is made in this period of increasing semiotic fragmentation and cross-over.' Ron Scollon, Professor of Linguistics, Georgetown
£34.99
Bloomsbury Publishing (UK) Understanding Media Theory Hodder Arnold Publication
Book SynopsisKevin Williams is Professor of Media and Communication Studies at Swansea University. His publications include Get Me a Murder a Day! A History of Mass Communication in Britain (1998) and Shadows and Substance: The Development of a Media Policy for Wales (1997).Trade ReviewExcellent broad range covering the key areas of debate M Macher, Cambridge Regional CollegeTable of ContentsWhat is media theory?; production; content; reception; media policy and research.
£39.89
CRC Press Advances in Management Research Innovation and
Book SynopsisThis book covers advancements across business domains in knowledge and information management. It presents research trends in the fields of management, innovation, and technology, and is composed of research papers that show applications of IT, analytics, and business operations in industry and in educational institutions.It offers a combination of scientific research methods and concepts, with contributions from globally renowned authors; presents various management domains from a number of countries for a global perspective; and provides a unique combination of topics and methods while giving insights on the management domain using a holistic approach.The book provides scholars with a platform to derive maximum utility in the area of management, research, and technology by subscribing to the idea of managing business through performance and management technology.Table of ContentsPreface Editor Biographies Chapter 1 Impact of Credit Access on Economic Empowerment of Married Women in Ethiopia Chapter 2 Relationship between Work–Life Balance and Job Satisfaction of Reception and Concierge Employees in Five-Star Hotels in Colombo Chapter 3 The Evolution of Digital Platforms Chapter 4 Impact of Exchange Rate Movements and World Output on Indian Exports Chapter 5 Information and Communication Technology as a Contingent Factor in India’s Economic Growth–emittances Nexus Chapter 6 Effects of Capital Adequacy on Operational Efficiency of Banks: Evidence from Bangladesh Chapter 7 Time and Frequency Analysis Using the ARMA Model: Evidence from the Indian Stock Market Chapter 8 Behavioural Biases and Trading Volume: Empirical Evidence from the Indian Stock Market Chapter 9 Leveraging Tacit Knowledge for Strategizing: Impact on Long-Term Performance Chapter 10 Analysis of Investors’ Perceptions of Mutual Fund Investment in the Context of the Delhi/NCR Region Chapter 11 Measuring Customer Brand Equity and Loyalty: A Study of Fuel Retail Outlets in Lucknow Chapter 12 Random Walk Hypothesis: Evidence from the Top 10 Stock Exchanges Using the Variance Ratio Test Chapter 13 Priority-Based Time Minimization Transportation Problem with Flow and Mixed Constraints Chapter 14 ASEAN and India: Exploring the Progress and Prospects in Trade Relationship Chapter 15 Impact of Internationalization on Financial Performance: A Study of Family and Non-Family FirmsChapter 16 The Role of a Responsible Global Citizen (Gitizen) in the 21st Century Chapter 17 Small and Medium-Sized Enterprise Networks and Their Contribution to Territorial Development Chapter 18 Influence of Branding of Financial Instruments on Investment Decisions: Mediating Role of Behavioral Biases Chapter 19 Proposed Model of Evaluating Entrepreneurial University Ecosystems from a Talent Development Perspective Chapter 20 Research and Innovation in Teaching Pedagogy for Emerging Markets Index
£128.25
Springer-Verlag New York Inc. Introduction to Cryptography
Book Synopsis1 Integers.- 2 Congruences and Residue Class Rings.- 3 Encryption.- 4 Probability and Perfect Secrecy.- 5 DES.- 6 AES.- 7 Prime Number Generation.- 8 Public-Key Encryption.- 9 Factoring.- 10 Discrete Logarithms.- 11 Cryptographic Hash Functions.- 12 Digital Signatures.- 13 Other Systems.- 14 Identification.- 15 Secret Sharing.- 16 Public-Key Infrastructures.- Solutions of the exercises.- References.Trade ReviewFrom the reviews: Zentralblatt Math "[......] Of the three books under review, Buchmann's is by far the most sophisticated, complete and up-to-date. It was written for computer-science majors - German ones at that - and might be rough going for all but the best American undergraduates. It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms, clearly written sections describing most of the major types of cryptosystems, and explanations of basic concepts of practical cryptography such as hash functions, message authentication codes, signatures, passwords, certification authorities, and certificate chains. This book is an excellent reference, and I believe that it would also be a good textbook for a course for mathematics or computer science majors, provided that the instructor is prepared to supplement it with more leisurely treatments of some of the topics." N. Koblitz (Seattle, WA) - American Math. Society Monthly. J.A. Buchmann Introduction to Cryptography "It gives a clear and systematic introduction into the subject whose popularity is ever increasing, and can be recommended to all who would like to learn about cryptography. The book contains many exercises and examples. It can be used as a textbook and is likely to become popular among students. The necessary definitions and concepts from algebra, number theory and probability theory are formulated, illustrated by examples and applied to cryptography." —ZENTRALBLATT MATH "For those of use who wish to learn more about cryptography and/or to teach it, Johannes Buchmann has written this book. … The book is mathematically complete and a satisfying read. There are plenty of homework exercises … . This is a good book for upperclassmen, graduate students, and faculty. … This book makes a superior reference and a fine textbook." (Robert W. Vallin, MathDL, January, 2001) "Buchmann’s book is a text on cryptography intended to be used at the undergraduate level. … the intended audiences of this book are ‘readers who want to learn about modern cryptographic algorithms and their mathematical foundations … . I enjoy reading this book. … Readers will find a good exposition of the techniques used in developing and analyzing these algorithms. … These make Buchmann’s text an excellent choice for self study or as a text for students … in elementary number theory and algebra." (Andrew C. Lee, SIGACT News, Vol. 34 (4), 2003) From the reviews of the second edition: "This is the english translation of the second edition of the author’s prominent german textbook ‘Einführung in die Kryptographie’. The original text grew out of several courses on cryptography given by the author at the Technical University Darmstadt; it is aimed at readers who want to learn about modern cryptographic techniques and its mathematical foundations … . As compared with the first edition the number of exercises has almost been doubled and some material … has been added." (R. Steinbauer, Monatshefte für Mathematik, Vol. 150 (4), 2007)Table of ContentsIntegers.- Congruences and Residue Class Rings.- Encryption.- Probability and Perfect Secrecy.- DES.- AES.- Prime Number Generation.- Public-Key Encryption.- Factoring.- Discrete Logarithms.- Cryptographic Hash Functions.- Digital Signatures.- Other Systems.- Identification.- Public-Key Infrastructures.- Solutions of the Odd Exercises.- Subject Index.- Bibliography.
£53.99
Taylor & Francis Ltd The Virtual Embodied
Book SynopsisThe Virtual Embodied is intended to inform, provoke and delight. It explores the ideas of embodiment, knowledge, space, virtue and virtuality to address fundamental questions about technology and human presence. It juxtaposes cutting-edge theories, polemics, and creative practices to uncover ethical, aesthetic and ecological implications of why, how and in particular where, human actions, observations and insights take place. In The Virtual Embodied, many of the authors, artists, performers and designers apply their interdisciplinary passions to questions of embodied knowledge and virtual space. In doing so it chooses to acknowledge the limitations of the conventional linear book and uses them creatively to challenge existing genres of multi-media and networked consumerism.Trade Review'The virtue of The Virtual Embodied lies in its unexpected and often lateral treatments of the theme of the virtual, and how, through the persuasiveness of critique, it can be applied to a variety of social and cultural conditions.' - Social Semiotics, 10(1), 2000Table of Contents0 Curvatures in space-time-truth John Wood Part 1: EMBODIED KNOWLEDGE AND VIRTUAL SPACE 1. Embodied knowledge and virtual space: gender, nature and history Vic Seidler 2. The Digital Unconscious John Monk 3. Physical, Psychological, & Virtual Realities Max Velmans Part 2: NATURE AND VIRTUE 4. Nature=X: Notes on Spinozist Ethics Andy Goffey 5. Enbodying Virtue: A Buddhist perspective on VR Damien Keown 6. Re-designing the Present John Wood Part 3: EMBODYING TRUTH 7. Hubble Telescope: Artist in th Eye of the Storm Gustav Metzger 8. A more Convivial Perspective System for Artists Peter Cresswell 9. Ancient Oaks Garth Rennie & Ronald Fraser-Munro 10. Culture, Technology, & Sujectivity: An `Ethical` Analysis Lisa Blackman Part 4: WHEN BECOMING MEETS BECOMING 11. The Dream Garden; Notes on Virtual Idyll Robert Wells 12. The `Return Beat`: Curved Perceptions in Dance Olu Taiwo 13. `Peak Practices`, the Production and regulation of ecstatic bodies Maria Pini Part 5: BETWEEN SAYING AND SHOWING 14. + Margot Leigh Butler 15. (sait) Claudia Wegener 16. PD (copyright) TM: The Digital Hostess Rachel Baker 17. Messages from Sir Arthur & the Rev. Bill Ronald Fraser-Munro INDEX
£128.25
Taylor & Francis Ltd Systems Practice in the Information Society
Book SynopsisAs a collection of ideas and methodologies, systems thinking has made an impact in organizations and in particular in the information systems field. However, this main emphasis on organizations limits the scope of systems thinking and practice. There is a need first to use systems thinking in addressing societal problems, and second to enable people involved in developing the information society to reflect on the impacts of systems and technologies in society as a whole. Thus, there are opportunities to review the scope and potential of systems thinking and practice to deal with information society-related issues. Systems Practice in the Information Society provides students of information systems as well as practicing Inofrmation Systems managers with concepts and strategies to enable them to understand and use systems thinking methodologies and address challenges posed by the development of information-based societies. This book brings experiences, ideaTable of Contents1. Introduction 2. The Information Society 3. Systems-Thinking 4. Applied Systems-Thinking 5. Idealist Pattern for Practice in the Information Society 6. Strategic Pattern of Pracitice for the Information Society 7. Power-based Pattern for Practice in the Information Society 8. A Dynamic Practice Framework for Living and Working in the Information Society 9. Conclusions
£171.00
Elsevier Science Foundations of Quantum Programming
Book Synopsis
£103.50
Elsevier Science Theoretical Foundations of Quantum Computing
Book Synopsis
£65.69
INGRAM PUBLISHER SERVICES US The Master Algorithm
Book Synopsis Recommended by Bill Gates A thought-provoking and wide-ranging exploration of machine learning and the race to build computer intelligences as flexible as our own In the world's top research labs and universities, the race is on to invent the ultimate learning algorithm: one capable of discovering any knowledge from data, and doing anything we want, before we even ask. In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner--the Master Algorithm--and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.
£11.99
John Wiley & Sons Inc Distributed Source Coding
Book SynopsisDistributed source coding is one of the key enablers for efficient cooperative communication. The potential applications range from wireless sensor networks, ad-hoc networks, and surveillance networks, to robust low-complexity video coding, stereo/Multiview video coding, HDTV, hyper-spectral and multispectral imaging, and biometrics. The book is divided into three sections: theory, algorithms, and applications. Part one covers the background of information theory with an emphasis on DSC; part two discusses designs of algorithmic solutions for DSC problems, covering the three most important DSC problems: Slepian-Wolf, Wyner-Ziv, and MT source coding; and part three is dedicated to a variety of potential DSC applications. Key features: Clear explanation of distributed source coding theory and algorithms including both lossless and lossy designs. Rich applications of distributed source coding, which covers multimedia communication and data security aTable of ContentsPreface xiii Acknowledgment xv About the Companion Website xvii 1 Introduction 1 1.1 What is Distributed Source Coding? 2 1.2 Historical Overview and Background 2 1.3 Potential and Applications 3 1.4 Outline 4 Part I Theory of Distributed Source Coding 7 2 Lossless Compression of Correlated Sources 9 2.1 Slepian–Wolf Coding 10 2.1.1 Proof of the SWTheorem 15 Achievability of the SWTheorem 16 Converse of the SWTheorem 19 2.2 Asymmetric and Symmetric SWCoding 21 2.3 SWCoding of Multiple Sources 22 3 Wyner–Ziv Coding Theory 25 3.1 Forward Proof ofWZ Coding 27 3.2 Converse Proof of WZ Coding 29 3.3 Examples 30 3.3.1 Doubly Symmetric Binary Source 30 Problem Setup 30 A Proposed Scheme 31 Verify the Optimality of the Proposed Scheme 32 3.3.2 Quadratic Gaussian Source 35 Problem Setup 35 Proposed Scheme 36 Verify the Optimality of the Proposed Scheme 37 3.4 Rate Loss of theWZ Problem 38 Binary Source Case 39 Rate loss of General Cases 39 4 Lossy Distributed Source Coding 41 4.1 Berger–Tung Inner Bound 42 4.1.1 Berger–Tung Scheme 42 Codebook Preparation 42 Encoding 42 Decoding 43 4.1.2 Distortion Analysis 43 4.2 Indirect Multiterminal Source Coding 45 4.2.1 Quadratic Gaussian CEO Problem with Two Encoders 45 Forward Proof of Quadratic Gaussian CEO Problem with Two Terminals 46 Converse Proof of Quadratic Gaussian CEO Problem with Two Terminals 48 4.3 Direct Multiterminal Source Coding 54 4.3.1 Forward Proof of Gaussian Multiterminal Source Coding Problem with Two Sources 55 4.3.2 Converse Proof of Gaussian Multiterminal Source Coding Problem with Two Sources 63 Bounds for R1 and R2 64 Collaborative Lower Bound 66 𝜇-sum Bound 67 Part II Implementation 75 5 Slepian–Wolf Code Designs Based on Channel Coding 77 5.1 Asymmetric SWCoding 77 5.1.1 Binning Idea 78 5.1.2 Syndrome-based Approach 79 Hamming Binning 80 SWEncoding 80 SWDecoding 80 LDPC-based SWCoding 81 5.1.3 Parity-based Approach 82 5.1.4 Syndrome-based Versus Parity-based Approach 84 5.2 Non-asymmetric SWCoding 85 5.2.1 Generalized Syndrome-based Approach 86 5.2.2 Implementation using IRA Codes 88 5.3 Adaptive Slepian–Wolf Coding 90 5.3.1 Particle-based Belief Propagation for SWCoding 91 5.4 Latest Developments and Trends 93 6 Distributed Arithmetic Coding 97 6.1 Arithmetic Coding 97 6.2 Distributed Arithmetic Coding 101 6.3 Definition of the DAC Spectrum 103 6.3.1 Motivations 103 6.3.2 Initial DAC Spectrum 104 6.3.3 Depth-i DAC Spectrum 105 6.3.4 Some Simple Properties of the DAC Spectrum 107 6.4 Formulation of the Initial DAC Spectrum 107 6.5 Explicit Form of the Initial DAC Spectrum 110 6.6 Evolution of the DAC Spectrum 113 6.7 Numerical Calculation of the DAC Spectrum 116 6.7.1 Numerical Calculation of the Initial DAC Spectrum 117 6.7.2 Numerical Estimation of DAC Spectrum Evolution 118 6.8 Analyses on DAC Codes with Spectrum 120 6.8.1 Definition of DAC Codes 121 6.8.2 Codebook Cardinality 122 6.8.3 Codebook Index Distribution 123 6.8.4 Rate Loss 123 6.8.5 Decoder Complexity 124 6.8.6 Decoding Error Probability 126 6.9 Improved Binary DAC Codec 130 6.9.1 Permutated BDAC Codec 130 Principle 130 Proof of SWLimit Achievability 131 6.9.2 BDAC Decoder withWeighted Branching 132 6.10 Implementation of the Improved BDAC Codec 134 6.10.1 Encoder 134 Principle 134 Implementation 135 6.10.2 Decoder 135 Principle 135 Implementation 136 6.11 Experimental Results 138 Effect of Segment Size on Permutation Technique 139 Effect of Surviving-Path Number onWB Technique 139 Comparison with LDPC Codes 139 Application of PBDAC to Nonuniform Sources 140 6.12 Conclusion 141 7 Wyner–Ziv Code Design 143 7.1 Vector Quantization 143 7.2 Lattice Theory 146 7.2.1 What is a Lattice? 146 Examples 146 Dual Lattice 147 Integral Lattice 147 Lattice Quantization 148 7.2.2 What is a Good Lattice? 149 Packing Efficiency 149 Covering Efficiency 150 Normalized Second Moment 150 Kissing Number 150 Some Good Lattices 151 7.3 Nested Lattice Quantization 151 Encoding/decoding 152 Coset Binning 152 Quantization Loss and Binning Loss 153 SW Coded NLQ 154 7.3.1 Trellis Coded Quantization 154 7.3.2 Principle of TCQ 155 Generation of Codebooks 156 Generation of Trellis from Convolutional Codes 156 Mapping of Trellis Branches onto Sub-codebooks 157 Quantization 157 Example 158 7.4 WZ Coding Based on TCQ and LDPC Codes 159 7.4.1 Statistics of TCQ Indices 159 7.4.2 LLR of Trellis Bits 162 7.4.3 LLR of Codeword Bits 163 7.4.4 Minimum MSE Estimation 163 7.4.5 Rate Allocation of Bit-planes 164 7.4.6 Experimental Results 166 Part III Applications 167 8 Wyner–Ziv Video Coding 169 8.1 Basic Principle 169 8.2 Benefits of WZ Video Coding 170 8.3 Key Components of WZ Video Decoding 171 8.3.1 Side-information Preparation 171 Bidirectional Motion Compensation 172 8.3.2 Correlation Modeling 173 Exploiting Spatial Redundancy 174 8.3.3 Rate Controller 175 8.4 Other Notable Features of Miscellaneous WZ Video Coders 175 9 Correlation Estimation in DVC 177 9.1 Background to Correlation Parameter Estimation in DVC 177 9.1.1 Correlation Model inWZ Video Coding 177 9.1.2 Offline Correlation Estimation 178 Pixel Domain Offline Correlation Estimation 178 Transform Domain Offline Correlation Estimation 180 9.1.3 Online Correlation Estimation 181 Pixel Domain Online Correlation Estimation 182 Transform Domain Online Correlation Estimation 184 9.2 Recap of Belief Propagation and Particle Filter Algorithms 185 9.2.1 Belief Propagation Algorithm 185 9.2.2 Particle Filtering 186 9.3 Correlation Estimation in DVC with Particle Filtering 187 9.3.1 Factor Graph Construction 187 9.3.2 Correlation Estimation in DVC with Particle Filtering 190 9.3.3 Experimental Results 192 9.3.4 Conclusion 197 9.4 Low Complexity Correlation Estimation using Expectation Propagation 199 9.4.1 System Architecture 199 9.4.2 Factor Graph Construction 199 Joint Bit-plane SWCoding (Region II) 200 Correlation Parameter Tracking (Region I) 201 9.4.3 Message Passing on the Constructed Factor Graph 202 Expectation Propagation 203 9.4.4 Posterior Approximation of the Correlation Parameter using Expectation Propagation 204 Moment Matching 205 9.4.5 Experimental Results 206 9.4.6 Conclusion 211 10 DSC for Solar Image Compression 213 10.1 Background 213 10.2 RelatedWork 215 10.3 Distributed Multi-view Image Coding 217 10.4 Adaptive Joint Bit-plane WZ Decoding of Multi-view Images with Disparity Estimation 217 10.4.1 Joint Bit-planeWZ Decoding 217 10.4.2 Joint Bit-planeWZ Decoding with Disparity Estimation 219 10.4.3 Joint Bit-planeWZ Decoding with Correlation Estimation 220 10.5 Results and Discussion 221 10.6 Summary 224 11 Secure Distributed Image Coding 225 11.1 Background 225 11.2 System Architecture 227 11.2.1 Compression of Encrypted Data 228 11.2.2 Joint Decompression and Decryption Design 230 11.3 Practical Implementation Issues 233 11.4 Experimental Results 233 11.4.1 Experiment Setup 234 11.4.2 Security and Privacy Protection 235 11.4.3 Compression Performance 236 11.5 Discussion 239 12 Secure Biometric Authentication Using DSC 241 12.1 Background 241 12.2 RelatedWork 243 12.3 System Architecture 245 12.3.1 Feature Extraction 246 12.3.2 Feature Pre-encryption 248 12.3.3 SeDSC Encrypter/decrypter 248 12.3.4 Privacy-preserving Authentication 249 12.4 SeDSC Encrypter Design 249 12.4.1 Non-asymmetric SWCodes with Code Partitioning 250 12.4.2 Implementation of SeDSC Encrypter using IRA Codes 251 12.5 SeDSC Decrypter Design 252 12.6 Experiments 256 12.6.1 Dataset and Experimental Setup 256 12.6.2 Feature Length Selection 257 12.6.3 Authentication Accuracy 257 Authentication Performances on Small Feature Length (i.e., N = 100) 257 Performances on Large Feature Lengths (i.e., N ≥ 300) 258 12.6.4 Privacy and Security 259 12.6.5 Complexity Analysis 261 12.7 Discussion 261 A Basic Information Theory 263 A.1 Information Measures 263 A.1.1 Entropy 263 A.1.2 Relative Entropy 267 A.1.3 Mutual Information 268 A.1.4 Entropy Rate 269 A.2 Independence and Mutual Information 270 A.3 Venn Diagram Interpretation 273 A.4 Convexity and Jensen’s Inequality 274 A.5 Differential Entropy 277 A.5.1 Gaussian Random Variables 278 A.5.2 Entropy Power Inequality 278 A.6 Typicality 279 A.6.1 Jointly Typical Sequences 282 A.7 Packing Lemmas and Covering Lemmas 284 A.8 Shannon’s Source CodingTheorem 286 A.9 Lossy Source Coding—Rate-distortionTheorem 289 A.9.1 Rate-distortion Problem with Side Information 291 B Background on Channel Coding 293 B.1 Linear Block Codes 294 B.1.1 Syndrome Decoding of Block Codes 295 B.1.2 Hamming Codes, Packing Bound, and Perfect Codes 295 B.2 Convolutional Codes 297 B.2.1 Viterbi Decoding Algorithm 298 B.3 Shannon’s Channel CodingTheorem 301 B.3.1 Achievability Proof of the Channel CodingTheorem 303 B.3.2 Converse Proof of Channel CodingTheorem 305 B.4 Low-density Parity-check Codes 306 B.4.1 A Quick Summary of LDPC Codes 306 B.4.2 Belief Propagation Algorithm 307 B.4.3 LDPC Decoding using BP 312 B.4.4 IRA Codes 314 C Approximate Inference 319 C.1 Stochastic Approximation 319 C.1.1 Importance SamplingMethods 320 C.1.2 Markov Chain Monte Carlo 321 Markov Chains 321 Markov Chain Monte Carlo 321 C.2 Deterministic Approximation 322 C.2.1 Preliminaries 322 Exponential Family 322 Kullback–Leibler Divergence 323 Assumed-density Filtering 324 C.2.2 Expectation Propagation 325 Relationship with BP 326 C.2.3 Relationship with Other Variational Inference Methods 328 D Multivariate Gaussian Distribution 331 D.1 Introduction 331 D.2 Probability Density Function 331 D.3 Marginalization 332 D.4 Conditioning 333 D.5 Product of Gaussian pdfs 334 D.6 Division of Gaussian pdfs 337 D.7 Mixture of Gaussians 337 D.7.1 Reduce the Number of Components in Gaussian Mixtures 338 Which Components to Merge? 340 How to Merge Components? 341 D.8 Summary 342 Appendix: Matrix Equations 343 Bibliography 345 Index 357
£118.34
John Wiley & Sons Inc Elements of Information Theory Wiley Series in
Book SynopsisThe latest edition of this classic is updated with new problem sets and material The Second Edition of this fundamental textbook maintains the book''s tradition of clear, thought-provoking instruction. Readers are provided once again with an instructive mix of mathematics, physics, statistics, and information theory. All the essential topics in information theory are covered in detail, including entropy, data compression, channel capacity, rate distortion, network information theory, and hypothesis testing. The authors provide readers with a solid understanding of the underlying theory and applications. Problem sets and a telegraphic summary at the end of each chapter further assist readers. The historical notes that follow each chapter recap the main points. The Second Edition features: * Chapters reorganized to improve teaching * 200 new problems * New material on source coding, portfolio theory, and feedback capacity * Updated referencTrade Review"As expected, the quality of exposition continues to be a high point of the book. Clear explanations, nice graphical illustrations, and illuminating mathematical derivations make the book particularly useful as a textbook on information theory." (Journal of the American Statistical Association, March 2008) "This book is recommended reading, both as a textbook and as a reference." (Computing Reviews.com, December 28, 2006)Table of ContentsContents v Preface to the Second Edition xv Preface to the First Edition xvii Acknowledgments for the Second Edition xxi Acknowledgments for the First Edition xxiii 1 Introduction and Preview 1 1.1 Preview of the Book 5 2 Entropy, Relative Entropy, and Mutual Information 13 2.1 Entropy 13 2.2 Joint Entropy and Conditional Entropy 16 2.3 Relative Entropy and Mutual Information 19 2.4 Relationship Between Entropy and Mutual Information 20 2.5 Chain Rules for Entropy, Relative Entropy, and Mutual Information 22 2.6 Jensen’s Inequality and Its Consequences 25 2.7 Log Sum Inequality and Its Applications 30 2.8 Data-Processing Inequality 34 2.9 Sufficient Statistics 35 2.10 Fano’s Inequality 37 Summary 41 Problems 43 Historical Notes 54 3 Asymptotic Equipartition Property 57 3.1 Asymptotic Equipartition Property Theorem 58 3.2 Consequences of the AEP: Data Compression 60 3.3 High-Probability Sets and the Typical Set 62 Summary 64 Problems 64 Historical Notes 69 4 Entropy Rates of a Stochastic Process 71 4.1 Markov Chains 71 4.2 Entropy Rate 74 4.3 Example: Entropy Rate of a Random Walk on a Weighted Graph 78 4.4 Second Law of Thermodynamics 81 4.5 Functions of Markov Chains 84 Summary 87 Problems 88 Historical Notes 100 5 Data Compression 103 5.1 Examples of Codes 103 5.2 Kraft Inequality 107 5.3 Optimal Codes 110 5.4 Bounds on the Optimal Code Length 112 5.5 Kraft Inequality for Uniquely Decodable Codes 115 5.6 Huffman Codes 118 5.7 Some Comments on Huffman Codes 120 5.8 Optimality of Huffman Codes 123 5.9 Shannon–Fano–Elias Coding 127 5.10 Competitive Optimality of the Shannon Code 130 5.11 Generation of Discrete Distributions from Fair Coins 134 Summary 141 Problems 142 Historical Notes 157 6 Gambling and Data Compression 159 6.1 The Horse Race 159 6.2 Gambling and Side Information 164 6.3 Dependent Horse Races and Entropy Rate 166 6.4 The Entropy of English 168 6.5 Data Compression and Gambling 171 6.6 Gambling Estimate of the Entropy of English 173 Summary 175 Problems 176 Historical Notes 182 7 Channel Capacity 183 7.1 Examples of Channel Capacity 184 7.1.1 Noiseless Binary Channel 184 7.1.2 Noisy Channel with Nonoverlapping Outputs 185 7.1.3 Noisy Typewriter 186 7.1.4 Binary Symmetric Channel 187 7.1.5 Binary Erasure Channel 188 7.2 Symmetric Channels 189 7.3 Properties of Channel Capacity 191 7.4 Preview of the Channel Coding Theorem 191 7.5 Definitions 192 7.6 Jointly Typical Sequences 195 7.7 Channel Coding Theorem 199 7.8 Zero-Error Codes 205 7.9 Fano’s Inequality and the Converse to the Coding Theorem 206 7.10 Equality in the Converse to the Channel Coding Theorem 208 7.11 Hamming Codes 210 7.12 Feedback Capacity 216 7.13 Source–Channel Separation Theorem 218 Summary 222 Problems 223 Historical Notes 240 8 Differential Entropy 243 8.1 Definitions 243 8.2 AEP for Continuous Random Variables 245 8.3 Relation of Differential Entropy to Discrete Entropy 247 8.4 Joint and Conditional Differential Entropy 249 8.5 Relative Entropy and Mutual Information 250 8.6 Properties of Differential Entropy, Relative Entropy, and Mutual Information 252 Summary 256 Problems 256 Historical Notes 259 9 Gaussian Channel 261 9.1 Gaussian Channel: Definitions 263 9.2 Converse to the Coding Theorem for Gaussian Channels 268 9.3 Bandlimited Channels 270 9.4 Parallel Gaussian Channels 274 9.5 Channels with Colored Gaussian Noise 277 9.6 Gaussian Channels with Feedback 280 Summary 289 Problems 290 Historical Notes 299 10 Rate Distortion Theory 301 10.1 Quantization 301 10.2 Definitions 303 10.3 Calculation of the Rate Distortion Function 307 10.3.1 Binary Source 307 10.3.2 Gaussian Source 310 10.3.3 Simultaneous Description of Independent Gaussian Random Variables 312 10.4 Converse to the Rate Distortion Theorem 315 10.5 Achievability of the Rate Distortion Function 318 10.6 Strongly Typical Sequences and Rate Distortion 325 10.7 Characterization of the Rate Distortion Function 329 10.8 Computation of Channel Capacity and the Rate Distortion Function 332 Summary 335 Problems 336 Historical Notes 345 11 Information Theory and Statistics 347 11.1 Method of Types 347 11.2 Law of Large Numbers 355 11.3 Universal Source Coding 357 11.4 Large Deviation Theory 360 11.5 Examples of Sanov’s Theorem 364 11.6 Conditional Limit Theorem 366 11.7 Hypothesis Testing 375 11.8 Chernoff–Stein Lemma 380 11.9 Chernoff Information 384 11.10 Fisher Information and the Cramér–Rao Inequality 392 Summary 397 Problems 399 Historical Notes 408 12 Maximum Entropy 409 12.1 Maximum Entropy Distributions 409 12.2 Examples 411 12.3 Anomalous Maximum Entropy Problem 413 12.4 Spectrum Estimation 415 12.5 Entropy Rates of a Gaussian Process 416 12.6 Burg’s Maximum Entropy Theorem 417 Summary 420 Problems 421 Historical Notes 425 13 Universal Source Coding 427 13.1 Universal Codes and Channel Capacity 428 13.2 Universal Coding for Binary Sequences 433 13.3 Arithmetic Coding 436 13.4 Lempel–Ziv Coding 440 13.4.1 Sliding Window Lempel–Ziv Algorithm 441 13.4.2 Tree-Structured Lempel–Ziv Algorithms 442 13.5 Optimality of Lempel–Ziv Algorithms 443 13.5.1 Sliding Window Lempel–Ziv Algorithms 443 13.5.2 Optimality of Tree-Structured Lempel–Ziv Compression 448 Summary 456 Problems 457 Historical Notes 461 14 Kolmogorov Complexity 463 14.1 Models of Computation 464 14.2 Kolmogorov Complexity: Definitions and Examples 466 14.3 Kolmogorov Complexity and Entropy 473 14.4 Kolmogorov Complexity of Integers 475 14.5 Algorithmically Random and Incompressible Sequences 476 14.6 Universal Probability 480 14.7 Kolmogorov complexity 482 14.8 Ω 484 14.9 Universal Gambling 487 14.10 Occam’s Razor 488 14.11 Kolmogorov Complexity and Universal Probability 490 14.12 Kolmogorov Sufficient Statistic 496 14.13 Minimum Description Length Principle 500 Summary 501 Problems 503 Historical Notes 507 15 Network Information Theory 509 15.1 Gaussian Multiple-User Channels 513 15.1.1 Single-User Gaussian Channel 513 15.1.2 Gaussian Multiple-Access Channel with m Users 514 15.1.3 Gaussian Broadcast Channel 515 15.1.4 Gaussian Relay Channel 516 15.1.5 Gaussian Interference Channel 518 15.1.6 Gaussian Two-Way Channel 519 15.2 Jointly Typical Sequences 520 15.3 Multiple-Access Channel 524 15.3.1 Achievability of the Capacity Region for the Multiple-Access Channel 530 15.3.2 Comments on the Capacity Region for the Multiple-Access Channel 532 15.3.3 Convexity of the Capacity Region of the Multiple-Access Channel 534 15.3.4 Converse for the Multiple-Access Channel 538 15.3.5 m-User Multiple-Access Channels 543 15.3.6 Gaussian Multiple-Access Channels 544 15.4 Encoding of Correlated Sources 549 15.4.1 Achievability of the Slepian–Wolf Theorem 551 15.4.2 Converse for the Slepian–Wolf Theorem 555 15.4.3 Slepian–Wolf Theorem for Many Sources 556 15.4.4 Interpretation of Slepian–Wolf Coding 557 15.5 Duality Between Slepian–Wolf Encoding and Multiple-Access Channels 558 15.6 Broadcast Channel 560 15.6.1 Definitions for a Broadcast Channel 563 15.6.2 Degraded Broadcast Channels 564 15.6.3 Capacity Region for the Degraded Broadcast Channel 565 15.7 Relay Channel 571 15.8 Source Coding with Side Information 575 15.9 Rate Distortion with Side Information 580 15.10 General Multiterminal Networks 587 Summary 594 Problems 596 Historical Notes 609 16 Information Theory and Portfolio Theory 613 16.1 The Stock Market: Some Definitions 613 16.2 Kuhn–Tucker Characterization of the Log-Optimal Portfolio 617 16.3 Asymptotic Optimality of the Log-Optimal Portfolio 619 16.4 Side Information and the Growth Rate 621 16.5 Investment in Stationary Markets 623 16.6 Competitive Optimality of the Log-Optimal Portfolio 627 16.7 Universal Portfolios 629 16.7.1 Finite-Horizon Universal Portfolios 631 16.7.2 Horizon-Free Universal Portfolios 638 16.8 Shannon–McMillan–Breiman Theorem (General AEP) 644 Summary 650 Problems 652 Historical Notes 655 17 Inequalities in Information Theory 657 17.1 Basic Inequalities of Information Theory 657 17.2 Differential Entropy 660 17.3 Bounds on Entropy and Relative Entropy 663 17.4 Inequalities for Types 665 17.5 Combinatorial Bounds on Entropy 666 17.6 Entropy Rates of Subsets 667 17.7 Entropy and Fisher Information 671 17.8 Entropy Power Inequality and Brunn–Minkowski Inequality 674 17.9 Inequalities for Determinants 679 17.10 Inequalities for Ratios of Determinants 683 Summary 686 Problems 686 Historical Notes 687 Bibliography 689 List of Symbols 723 Index 727
£92.66
John Wiley & Sons Inc Mobile Satellite Communications Handbook
Book SynopsisThis text provides detailed coverage of mobile satellite communications systems either being planned or in construction, and assesses the impact they will have on business and daily living world-wide.Table of ContentsIntroduction to Satellite Communications. Early Proposals for Mobile Satellite Communications. Marisat and Marecs: Pioneering Commercial Mobile Satellite Services. Inmarsat. Other Mobile Satellite Communications Systems in Service. Planned Geostationary Mobile Satellite Systems. Planned Low Earth Orbiting Mobile Satellite Systems for Telephone Service. Planned Low Earth Orbiting Mobile Satellite Systems for Data Service. Other Planned Mobile Satellite Communications Systems. A Note on Radio Spectrum Issues. Appendices. Index.
£174.56
Cambridge University Press Fundamentals of ErrorCorrecting Codes
Book SynopsisFundamentals of Error Correcting Codes is an in-depth introduction to coding theory from both an engineering and mathematical viewpoint. As well as covering classical topics, there is much coverage of techniques which could only be found in specialist journals and book publications. Numerous exercises and examples and an accessible writing style make this a lucid and effective introduction to coding theory for advanced undergraduate and graduate students, researchers and engineers, whether approaching the subject from a mathematical, engineering or computer science background.Trade ReviewReview of the hardback: 'Numerous exercises and examples and an accessible writing style make this a lucid and effective introduction to coding theory for advanced undergraduate and graduate students, researchers and engineers - whether approaching the subject from a mathematical, engineering or computer science background.' IASI Polytechnic MagazineTable of ContentsPreface; 1. Basic concepts of linear codes; 2. Bounds on size of codes; 3. Finite fields; 4. Cyclic codes; 5. BCH and Reed-Soloman codes; 6. Duadic codes; 7. Weight distributions; 8. Designs; 9. Self-dual codes; 10. Some favourite self-dual codes; 11. Covering radius and cosets; 12. Codes over Z4; 13. Codes from algebraic geometry; 14. Convolutional codes; 15. Soft decision and iterative decoding; Bibliography; Index.
£62.99
Cambridge University Press Lattice Coding for Signals and Networks
Book SynopsisUnifying information theory and digital communication through the language of lattice codes, this book provides a detailed overview for students, researchers and industry practitioners. It covers classical work by leading researchers in the field of lattice codes and complementary work on dithered quantization and infinite constellations, and then introduces the more recent results on ''algebraic binning'' for side-information problems, and linear/lattice codes for networks. It shows how high dimensional lattice codes can close the gap to the optimal information theoretic solution, including the characterisation of error exponents. The solutions presented are based on lattice codes, and are therefore close to practical implementations, with many advanced setups and techniques, such as shaping, entropy-coding, side-information and multi-terminal systems. Moreover, some of the network setups shown demonstrate how lattice codes are potentially more efficient than traditional random-codingTable of Contents1. Introduction; 2. Lattices; 3. Figures of merit; 4. Dithering and estimation; 5. Entropy-coded quantization; 6. Infinite constellation for modulation; 7. Asymptotic goodness; 8. Nested lattices; 9. Lattice shaping; 10. Side-information problems; 11. Modulo-lattice modulation with Yuval Kochman; 12. Gaussian networks with Bobak Nazer; 13. Error exponents.
£158.86
Princeton University Press The Evolution of Biological Information
Book Synopsis
£49.60
Princeton University Press The Evolution of Biological Information
Book Synopsis
£100.00
Princeton University Press The Physical Nature of Information
Book Synopsis
£44.00
Pluto Press Imaginary Futures From Thinking Machines to the
Book SynopsisThis book is a history of the future. It shows how our contemporary understanding of the Net is shaped by visions of the future that were put together in the 1950s and 1960s.Trade Review'Barbrook has an amusing take on our distorted - if not delusional - relationship with technology, but his underlying point is serious: future visions of technology are used to distract us and also control us, and if we forget these imaginary futures, we are likely to repeat them' -- Guardian Unlimited'A compelling, authoritative, and painstakingly documented narrative, Imaginary Futures traces the emergence of the computer era in the context of desperately competing ideologies, economics, and empires. This is a work of passionate and persuasive scholarship by a contemporary social theorist at the top of his game' -- Douglas Rushkoff, author, Coercion, Media Virus, Get Back in the Box.Table of Contents1. The Future Is What It Used To Be 2. The American Century 3. Cold War Computing 4. The Human Machine 5. Cybernetic Supremacy 6. The Global Village 7. The Cold War Left 8. The Chosen Few 9. Free Workers In The Affluent Society 10. The Prophets Of Post-Industrialism 11. The American Road to Cybernetic Communism 12. The Leader Of The Free World 13. The Great Game 14. The American Invasion Of Vietnam 15. Those Who Forget The Future Are Condemned To Repeat It References Index
£26.99
Pluto Press Imaginary Futures From Thinking Machines to the
Book SynopsisThis book is a history of the future. It shows how our contemporary understanding of the Net is shaped by visions of the future that were put together in the 1950s and 1960s.Trade Review'Barbrook has an amusing take on our distorted - if not delusional - relationship with technology, but his underlying point is serious: future visions of technology are used to distract us and also control us, and if we forget these imaginary futures, we are likely to repeat them' -- Guardian Unlimited'A compelling, authoritative, and painstakingly documented narrative, Imaginary Futures traces the emergence of the computer era in the context of desperately competing ideologies, economics, and empires. This is a work of passionate and persuasive scholarship by a contemporary social theorist at the top of his game' -- Douglas Rushkoff, author, Coercion, Media Virus, Get Back in the Box.Table of Contents1. The Future Is What It Used To Be 2. The American Century 3. Cold War Computing 4. The Human Machine 5. Cybernetic Supremacy 6. The Global Village 7. The Cold War Left 8. The Chosen Few 9. Free Workers In The Affluent Society 10. The Prophets Of Post-Industrialism 11. The American Road to Cybernetic Communism 12. The Leader Of The Free World 13. The Great Game 14. The American Invasion Of Vietnam 15. Those Who Forget The Future Are Condemned To Repeat It References Index
£68.00
Pluto Press Furious Technological Feminism and Digital
Book SynopsisA major work of feminist critical theory challenging the masculinist politics of digital media forms, practices and study.Trade Review'Furious rips beyond the vanity of know-it-all analysis to offer long-awaited new ways of thinking, feeling, and writing. Cunningly crafted by an authorial trio, it bewitches with performative feminist energies. I dare you to read it' -- Sally-Jane Norman, Founding Director of the Attenborough Centre for the Creative Arts at the University of Sussex'A rare gem of a book, Furious makes a sharp, critical feminist intervention in digital media research demonstrating the power of thinking together, going against the conventions of academic writing, and creating good trouble' -- Susanna Paasonen, co-author of 'NSFW: Sex, Humor, and Risk in Social Media''This wide-ranging and imaginative book makes a compelling case for a feminist techno-politics which challenges to the core the masculinist grip of computational culture and science. It's also a book which pays fine attention to the process of writing' -- Angela McRobbie, author of 'Be Creative: Making a Living in the New Culture Industries''A passionate guidebook to feminist theorising that refuses data as self-evident patterns and theory as beautiful abstractions, while insisting on the generative power of writing, fabulation, and future making' -- Lucy Suchman, author of 'Feminist STS and the Sciences of the Artificial''Combining clarity with rational ire, Furious insists on the power of insurgent, intersectional feminist epistemologies to disrupt, inspire, and transform. This collective feminist tour de force writes us a new course, away from the technophilic belief that technology will fix what ails the contemporary world and toward a critical and temperate utopianism' -- Carol Stabile, author of 'The Broadcast 41: Women and the Anti-Communist Blacklist'Table of ContentsSeries Preface Acknowledgements Preface 1. Feminist Futures: A Conditional Paeon for the Anything-Digital 2. Scale, Subject and Stories: Unreal Objects 3. Bland Ambition? Automation's Missing Visions 4. Driving at the Anthropocene, or, Let's Get Out of Here: How? 5. Technological Feminism and Digital Futures Bibliography Index
£68.00
Pluto Press Furious
Book SynopsisA major work of feminist critical theory challenging the masculinist politics of digital media forms, practices and study.Trade Review'Furious rips beyond the vanity of know-it-all analysis to offer long-awaited new ways of thinking, feeling, and writing. Cunningly crafted by an authorial trio, it bewitches with performative feminist energies. I dare you to read it' -- Sally-Jane Norman, Founding Director of the Attenborough Centre for the Creative Arts at the University of Sussex'A rare gem of a book, Furious makes a sharp, critical feminist intervention in digital media research demonstrating the power of thinking together, going against the conventions of academic writing, and creating good trouble' -- Susanna Paasonen, co-author of 'NSFW: Sex, Humor, and Risk in Social Media''This wide-ranging and imaginative book makes a compelling case for a feminist techno-politics which challenges to the core the masculinist grip of computational culture and science. It's also a book which pays fine attention to the process of writing' -- Angela McRobbie, author of 'Be Creative: Making a Living in the New Culture Industries''A passionate guidebook to feminist theorising that refuses data as self-evident patterns and theory as beautiful abstractions, while insisting on the generative power of writing, fabulation, and future making' -- Lucy Suchman, author of 'Feminist STS and the Sciences of the Artificial''Combining clarity with rational ire, Furious insists on the power of insurgent, intersectional feminist epistemologies to disrupt, inspire, and transform. This collective feminist tour de force writes us a new course, away from the technophilic belief that technology will fix what ails the contemporary world and toward a critical and temperate utopianism' -- Carol Stabile, author of 'The Broadcast 41: Women and the Anti-Communist Blacklist'Table of ContentsSeries Preface Acknowledgements Preface 1. Feminist Futures: A Conditional Paeon for the Anything-Digital 2. Scale, Subject and Stories: Unreal Objects 3. Bland Ambition? Automation's Missing Visions 4. Driving at the Anthropocene, or, Let's Get Out of Here: How? 5. Technological Feminism and Digital Futures Bibliography Index
£20.69
Institute of Physics Publishing Algorithmic Information Theory for Physicists and
Book SynopsisThis book has been written in the hope that readers will be able to absorb the key ideas behind algorithmic information theory so that they are in a better position to access the mathematical developments and to apply the ideas to their own areas of interest.
£108.00
IOP Publishing Ltd Forecasting with Maximum Entropy
Book Synopsis
£67.50
IOP Publishing Forecasting with Maximum Entropy
Book Synopsis
£23.75
State University of New York Press Conflict and Organizations Communicative
Book SynopsisFocuses on the constructive nature of conflict and stresses conflict management as opposed to conflict resolution. Presents a comprehensive view of organizational conflict.This collection provides a well-rounded view of organizational conflict in three broad categories: ways of thinking about organizational conflict, individual processes, and interaction processes. It enriches the positivistic literature on conflict and organizations with a focus on non-reductionistic views of conflict, individual and interactive processes of conflict, conflict management (as opposed to resolution), and the constructive nature of conflict-aiming at understanding rather than prescription.Recounting the history of the study of organizational conflict, the book presents alternative views to the traditional positivistic approach and the traditional assumption that conflict is destructive. Rather, conflict is seen as a naturally-occurring human phenomenon, which may manifest itself on different levels with negative or positive outcomes. The book also focuses on the individual, showing how predisposition or skills impact on conflict in the organization, and vice versa. It also examines conflict interaction processes and their reciprocal influence on individuals, the organization, and/or the environment.
£24.27