Listing 1 - 10 of 10 |
Sort by
|
Choose an application
manipulation --- contre-manipulation --- identifier les techniques de manipulation --- éthique --- stratégies des manipulateurs --- la manipulation domestique
Choose an application
Metadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008 will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web — the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collectively create structured information that can be extracted and used to enhance access to and use of information sources. Recent discussion has focused on how existing bibliographic standards can be expressed as Semantic Web vocabularies to facilitate the integration of library and cultural heritage data with other types of data. Harnessing the efforts of content providers and end-users to link, tag, edit, and describe their information in interoperable ways (”participatory metadata”) is a key step towards providing knowledge environments that are scalable, self-correcting, and evolvable. DC-2008 will explore conceptual and practical issues in the development and deployment of semantic and social applications to meet the needs of specific communities of practice.
Social Sciences --- Library & Information Science --- metadata --- social applications --- semantic applications --- Dublin Core --- Folksonomy --- Library of Congress Subject Headings --- Resource Description Framework --- Simple Knowledge Organization System --- Uniform Resource Identifier
Choose an application
Metadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008 will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web — the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collectively create structured information that can be extracted and used to enhance access to and use of information sources. Recent discussion has focused on how existing bibliographic standards can be expressed as Semantic Web vocabularies to facilitate the integration of library and cultural heritage data with other types of data. Harnessing the efforts of content providers and end-users to link, tag, edit, and describe their information in interoperable ways (”participatory metadata”) is a key step towards providing knowledge environments that are scalable, self-correcting, and evolvable. DC-2008 will explore conceptual and practical issues in the development and deployment of semantic and social applications to meet the needs of specific communities of practice.
Choose an application
Metadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008 will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web — the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collectively create structured information that can be extracted and used to enhance access to and use of information sources. Recent discussion has focused on how existing bibliographic standards can be expressed as Semantic Web vocabularies to facilitate the integration of library and cultural heritage data with other types of data. Harnessing the efforts of content providers and end-users to link, tag, edit, and describe their information in interoperable ways (”participatory metadata”) is a key step towards providing knowledge environments that are scalable, self-correcting, and evolvable. DC-2008 will explore conceptual and practical issues in the development and deployment of semantic and social applications to meet the needs of specific communities of practice.
Social Sciences --- Library & Information Science --- metadata --- social applications --- semantic applications --- Dublin Core --- Folksonomy --- Library of Congress Subject Headings --- Resource Description Framework --- Simple Knowledge Organization System --- Uniform Resource Identifier --- metadata --- social applications --- semantic applications --- Dublin Core --- Folksonomy --- Library of Congress Subject Headings --- Resource Description Framework --- Simple Knowledge Organization System --- Uniform Resource Identifier
Choose an application
société --- modèles de genre --- la construction sociale du masculin --- adolescence --- difficultés affectives et sociales --- conduites à risque --- connotations sociales du genre --- conduites à risque masculines --- rites de virilité --- rites de l'entre-soi --- formes de violence --- tueries scolaires --- le djihadisme --- l'impossibilité de s'identifier aux autres --- affiliation au monde --- fascination pour l'image --- formes de violences masculines
Choose an application
This Special Issue consists of seven papers that discuss how to enhance mobility management and its associated performance in the mobile-oriented future Internet (MOFI) environment. The first two papers deal with the architectural design and experimentation of mobility management schemes, in which new schemes are proposed and real-world testbed experimentations are performed. The subsequent three papers focus on the use of software-defined networks (SDN) for effective service provisioning in the MOFI environment, together with real-world practices and testbed experimentations. The remaining two papers discuss the network engineering issues in newly emerging mobile networks, such as flying ad-hoc networks (FANET) and connected vehicular networks.
flying ad hoc network (FANET) --- mobile ad hoc network (MANET) --- highly dynamic --- periodical --- topology change awareness --- routing protocol --- mobility management --- architecture --- implementation --- experimentation --- EU–Korea testbed --- SDN --- DASH --- QoE --- HTTP/3 --- QUIC --- traffic signal control --- shared lane --- control strategy --- vehicle-to-infrastructure --- variable lane line --- cloud computing --- management --- middle box --- placement --- resource --- vendor-agnostic --- virtual machine --- VM --- affordable playground --- hyper-converged SmartX Box --- distributed resources --- multi-site and virtualized cloud --- software-defined networking --- DevOps automation --- ILNP --- identifier-locator --- mobile network --- roaming --- n/a --- EU-Korea testbed
Choose an application
This Special Issue consists of seven papers that discuss how to enhance mobility management and its associated performance in the mobile-oriented future Internet (MOFI) environment. The first two papers deal with the architectural design and experimentation of mobility management schemes, in which new schemes are proposed and real-world testbed experimentations are performed. The subsequent three papers focus on the use of software-defined networks (SDN) for effective service provisioning in the MOFI environment, together with real-world practices and testbed experimentations. The remaining two papers discuss the network engineering issues in newly emerging mobile networks, such as flying ad-hoc networks (FANET) and connected vehicular networks.
Film, TV & radio --- flying ad hoc network (FANET) --- mobile ad hoc network (MANET) --- highly dynamic --- periodical --- topology change awareness --- routing protocol --- mobility management --- architecture --- implementation --- experimentation --- EU-Korea testbed --- SDN --- DASH --- QoE --- HTTP/3 --- QUIC --- traffic signal control --- shared lane --- control strategy --- vehicle-to-infrastructure --- variable lane line --- cloud computing --- management --- middle box --- placement --- resource --- vendor-agnostic --- virtual machine --- VM --- affordable playground --- hyper-converged SmartX Box --- distributed resources --- multi-site and virtualized cloud --- software-defined networking --- DevOps automation --- ILNP --- identifier-locator --- mobile network --- roaming --- flying ad hoc network (FANET) --- mobile ad hoc network (MANET) --- highly dynamic --- periodical --- topology change awareness --- routing protocol --- mobility management --- architecture --- implementation --- experimentation --- EU-Korea testbed --- SDN --- DASH --- QoE --- HTTP/3 --- QUIC --- traffic signal control --- shared lane --- control strategy --- vehicle-to-infrastructure --- variable lane line --- cloud computing --- management --- middle box --- placement --- resource --- vendor-agnostic --- virtual machine --- VM --- affordable playground --- hyper-converged SmartX Box --- distributed resources --- multi-site and virtualized cloud --- software-defined networking --- DevOps automation --- ILNP --- identifier-locator --- mobile network --- roaming
Choose an application
Platon --- politique et religion dans la Grèce antique --- Socrate --- immortalité de l'âme --- la philosophie --- la divinité --- Saint Augustin --- les mystères de la religion --- Blaise Pascal --- la religion chrétienne --- Baruch Spinoza --- obéir à Dieu --- les illusions de la religion --- la superstition --- valeur de la vie --- religion et philosophie --- religion et politique --- Jean-Jacques Rousseau --- l'amour de Dieu --- la conscience --- dimension morale de la religion --- l'expérience religieuse --- Kant --- la loi morale --- religion et raison --- religion morale --- religion et liberté --- Sören Kierkegaard --- le mystère de la foi --- Friedrich Nietzsche --- mort de Dieu --- illusions morales et religieuses --- la métaphysique --- christianisme --- libre esprit --- Sigmund Freud --- origines de la religion --- Régis Debray --- rôle et place du symbolique dans les sociétés humaines --- transcendance et cohésion sociale --- identifier le religieux --- communion --- existence et foi --- la religion comme névrose universelle
Choose an application
A practical guide to making good decisions in a world of missing dataIn the era of big data, it is easy to imagine that we have all the information we need to make good decisions. But in fact the data we have are never complete, and may be only the tip of the iceberg. Just as much of the universe is composed of dark matter, invisible to us but nonetheless present, the universe of information is full of dark data that we overlook at our peril. In Dark Data, data expert David Hand takes us on a fascinating and enlightening journey into the world of the data we don't see.Dark Data explores the many ways in which we can be blind to missing data and how that can lead us to conclusions and actions that are mistaken, dangerous, or even disastrous. Examining a wealth of real-life examples, from the Challenger shuttle explosion to complex financial frauds, Hand gives us a practical taxonomy of the types of dark data that exist and the situations in which they can arise, so that we can learn to recognize and control for them. In doing so, he teaches us not only to be alert to the problems presented by the things we don’t know, but also shows how dark data can be used to our advantage, leading to greater understanding and better decisions.Today, we all make decisions using data. Dark Data shows us all how to reduce the risk of making bad ones.
Big data. --- Data sets, Large --- Large data sets --- Data sets --- Missing observations (Statistics). --- Data, Missing (Statistics) --- Missing data (Statistics) --- Missing values (Statistics) --- Observations, Missing (Statistics) --- Values, Missing (Statistics) --- Estimation theory --- Multivariate analysis --- Multiple imputation (Statistics) --- Accuracy and precision. --- Adverse selection. --- Ambiguity. --- Analogy. --- Anonymity. --- Approximation. --- Arithmetic mean. --- Astronomer. --- Autism. --- Average. --- Awareness. --- Bankruptcy. --- Benford's law. --- Blood pressure. --- Calculation. --- Clinical trial. --- Confidentiality. --- Confirmation bias. --- Credit card. --- Credit score. --- Crime statistics. --- Customer. --- Dark data. --- Data science. --- Data set. --- Database. --- Decision-making. --- Detection. --- Disease. --- Economics. --- Effectiveness. --- Estimation. --- Experimental psychology. --- Explanation. --- Extrapolation. --- Financial transaction. --- Floor effect. --- Fraud. --- General Data Protection Regulation. --- Hypothesis. --- Identifier. --- Identity theft. --- Illustration. --- Imputation (statistics). --- Income. --- Indication (medicine). --- Inference. --- Information asymmetry. --- Insider trading. --- Insurance fraud. --- Insurance. --- Investor. --- Lawsuit. --- Measurement. --- Meta-analysis. --- Misinformation. --- Mismatch. --- Missing data. --- Observational error. --- Obstacle. --- Percentage. --- Plagiarism. --- Prediction. --- Probability. --- Proportionality (mathematics). --- Pseudonymization. --- Quantity. --- Randomized controlled trial. --- Randomness. --- Respondent. --- Result. --- Rounding. --- Salary. --- Sample Size. --- Sampling (statistics). --- Science. --- Scientist. --- Significant figures. --- Simulation. --- Skewness. --- Social science. --- Statistic. --- Statistical hypothesis testing. --- Statistician. --- Statistics. --- Suggestion. --- Symptom. --- Synthetic data. --- Tax avoidance. --- Tax. --- Technology. --- Theory. --- Thought. --- Uncertainty. --- Unemployment. --- Variable (mathematics). --- Wealth. --- Website. --- Writing. --- Year.
Choose an application
"Everything from law enforcement to space exploration relies on code written by people who, at the time, made choices and assumptions that would have long-lasting, profound implications for society. Torie Bosch brings together many of today’s leading technology experts to provide new perspectives on the code that shapes our lives. Contributors discuss a host of topics, such as how university databases were programmed long ago to accept only two genders, what the person who programmed the very first pop-up ad was thinking at the time, the first computer worm, the Bitcoin white paper, and perhaps the most famous seven words in Unix history: “You are not expected to understand this.” This compelling book tells the human stories behind programming, enabling those of us who don’t think much about code to recognize its importance, and those who work with it every day to better understand the long-term effects of the decisions they make. With an introduction by Ellen Ullman and contributions by Mahsa Alimardani, Elena Botella, Meredith Broussard, David Cassel, Arthur Daemmrich, Charles Duan, Quinn DuPont, Claire L. Evans, Hany Farid, James Grimmelmann, Katie Hafner, Susan C. Herring, Syeda Gulshan Ferdous Jana, Lowen Liu, John MacCormick, Brian McCullough, Charlton McIlwain, Lily Hay Newman, Margaret O’Mara, Will Oremus, Nick Partridge, Benjamin Pope, Joy Lisi Rankin, Afsaneh Rigot, Ellen R. Stofan, Lee Vinsel, Josephine Wolff, and Ethan Zuckerman." -- Publisher's description.
Computer programming --- Computer science --- COMPUTERS / Programming / General. --- Social aspects --- ARPANET. --- Addition. --- Advertising. --- Adviser. --- Amplitude. --- Analogy. --- Association for Computing Machinery. --- Attendance. --- Binary number. --- Black people. --- COBOL. --- Capability. --- Censorship. --- Certificate authority. --- Charles Babbage. --- Collaboration. --- Communication. --- Computation. --- Computer Fraud and Abuse Act. --- Computer. --- Computing. --- Consideration. --- Conspiracy theory. --- Data processing system. --- Debug (command). --- Detection. --- Digital Equipment Corporation. --- Edsger W. Dijkstra. --- Ellen Ullman. --- Email. --- Espionage. --- Fake news. --- Flight controller. --- Fortran. --- Fragility. --- GLIMPSE. --- Gravity well. --- Hidden Figures. --- Hyperlink. --- Identifier. --- Imagination. --- Infrasound. --- Ingenuity. --- Instrumentation. --- Intermediary. --- JPEG. --- Jacquard loom. --- Kapton. --- Katie Hafner. --- Larry Page. --- Law enforcement. --- Low-budget film. --- Magnetic field. --- Malware. --- Mathematician. --- Michael Mandiberg. --- Molecule. --- Morris worm. --- Nickname. --- Operating system. --- Orbital eccentricity. --- PDP-1. --- PL/I. --- Password. --- Perforated paper. --- Personalization. --- Pixel. --- Plumbing. --- Pollution. --- Pop-up ad. --- Popularity. --- Prediction. --- Process control. --- Profanity. --- Programmer. --- Programming language. --- Publication. --- Ray Tomlinson. --- Risk assessment. --- Screenshot. --- Server (computing). --- Shortage. --- Sobriquet. --- Software. --- Source lines of code. --- Spacecraft. --- Spacewar (video game). --- Spamming. --- Surveillance. --- System administrator. --- TX-0. --- Technology. --- Telegraphy. --- Teleprinter. --- The Misunderstanding. --- Thought. --- Unemployment. --- Unix. --- Verb. --- Vulnerability (computing). --- Informatics --- Science --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Sociology of knowledge --- COMPUTERS / Programming / General --- SOCIAL SCIENCE / Technology Studies
Listing 1 - 10 of 10 |
Sort by
|