Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
Style is a fundamental and ubiquitous aspect of the human experience: Everyone instantly and constantly assesses people and things according to their individual styles, academics establish careers by researching musical, artistic, or architectural styles, and entire industries maintain themselves by continuously creating and marketing new styles. Yet what exactly style is and how it works are elusive: We certainly know it when we see it, but there is no shared and clear understanding of the diverse phenomena that we call style. The Structure of Style explores this issue from a computational viewpoint, in terms of how information is represented, organized, and transformed in the production and perception of different styles. New computational techniques are now making it possible to model the role of style in the creation of and response to human artifacts-and therefore to develop software systems that directly make use of style in useful ways. Argamon, Burns, and Dubnov organize the research they have collected in this book according to the three roles that computation can play in stylistics. The first section of the book, Production, provides conceptual foundations by describing computer systems that create artifacts-musical pieces, texts, artworks-in different styles. The second section, Perception, explains methods for analyzing different styles and gleaning useful information, viewing style as a form of communication. The final section, Interaction, deals with reciprocal interaction between style producers and perceivers, in areas such as interactive media, improvised musical accompaniment, and game playing. The Structure of Style is written for researchers and practitioners in areas including information retrieval, computer art and music, digital humanities, computational linguistics, and artificial intelligence, who can all benefit from this comprehensive overview and in-depth description of current research in this active interdisciplinary field.
Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical structures, religious and ideological motivations, and predominantly non-territorial objectives. Governments and militaries are crafting new policies and doctrines to combat terror, but they desperately need new technologies to make these efforts effective. This book collects a wide range of the most current computational research that addresses critical issues for countering terrorism, including: Finding, summarizing, and evaluating relevant information from large and changing data stores; Simulating and predicting enemy acts and outcomes; and Producing actionable intelligence by finding meaningful patterns hidden in huge amounts of noisy data. The book's four sections describe current research on discovering relevant information buried in vast amounts of unstructured data; extracting meaningful information from digitized documents in multiple languages; analyzing graphs and networks to shed light on adversaries' goals and intentions; and developing software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts. The research described in this book is invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies, and for researchers developing more effective methods for knowledge discovery in complicated and diverse datasets.
Style is a fundamental and ubiquitous aspect of the human experience: Everyone instantly and constantly assesses people and things according to their individual styles, academics establish careers by researching musical, artistic, or architectural styles, and entire industries maintain themselves by continuously creating and marketing new styles. Yet what exactly style is and how it works are elusive: We certainly know it when we see it, but there is no shared and clear understanding of the diverse phenomena that we call style. The Structure of Style explores this issue from a computational viewpoint, in terms of how information is represented, organized, and transformed in the production and perception of different styles. New computational techniques are now making it possible to model the role of style in the creation of and response to human artifacts-and therefore to develop software systems that directly make use of style in useful ways. Argamon, Burns, and Dubnov organize the research they have collected in this book according to the three roles that computation can play in stylistics. The first section of the book, Production, provides conceptual foundations by describing computer systems that create artifacts-musical pieces, texts, artworks-in different styles. The second section, Perception, explains methods for analyzing different styles and gleaning useful information, viewing style as a form of communication. The final section, Interaction, deals with reciprocal interaction between style producers and perceivers, in areas such as interactive media, improvised musical accompaniment, and game playing. The Structure of Style is written for researchers and practitioners in areas including information retrieval, computer art and music, digital humanities, computational linguistics, and artificial intelligence, who can all benefit from this comprehensive overview and in-depth description of current research in this active interdisciplinary field.
This book constitutes the proceedings of the First International Conference on Big Data Computing and Communications, BigCom 2015, held in Taiyuan, China, in August 2015. The 41 papers presented in this volume were carefully reviewed and selected from 74 submissions. They were organized in topical sections named: wireless communication and networks; database and big data; smart phone and sensing application; security and privacy; architecture and applications; sensor networks and RFID; social networks and recommendation; signal processing and pattern recognition; and routing and resource management.
|
You may like...
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke
Paperback
|