Résultats de recherche de titre
Articles 1 à 20 sur 2793
Google's PageRank and Beyond: The Science of Search Engine Rankings
Par Amy N. Langville, Carl D. Meyer. 2006
Why doesn't your home page appear on the first page of search results, even when you query your own name?…
How do other web pages always appear at the top? What creates these powerful rankings? And how? The first book ever about the science of web page rankings, Google's PageRank and Beyond supplies the answers to these and other questions and more. The book serves two very different audiences: the curious science reader and the technical computational reader. The chapters build in mathematical sophistication, so that the first five are accessible to the general academic reader. While other chapters are much more mathematical in nature, each one contains something for both audiences. For example, the authors include entertaining asides such as how search engines make money and how the Great Firewall of China influences research. The book includes an extensive background chapter designed to help readers learn more about the mathematics of search engines, and it contains several MATLAB codes and links to sample web data sets. The philosophy throughout is to encourage readers to experiment with the ideas and algorithms in the text. Any business seriously interested in improving its rankings in the major search engines can benefit from the clear examples, sample code, and list of resources provided. Many illustrative examples and entertaining asides MATLAB code Accessible and informal style Complete and self-contained section for mathematics reviewNumerical Algorithms for Personalized Search in Self-organizing Information Networks
Par Sep Kamvar. 2011
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer…
and social networks. Representing much of the foundational research in this field, the book develops scalable algorithms that exploit the graphlike properties underlying personalized search and reputation management, and delves into realistic scenarios regarding Web-scale data.Sep Kamvar focuses on eigenvector-based techniques in Web search, introducing a personalized variant of Google's PageRank algorithm, and he outlines algorithms--such as the now-famous quadratic extrapolation technique--that speed up computation, making personalized PageRank feasible. Kamvar suggests that Power Method-related techniques ultimately should be the basis for improving the PageRank algorithm, and he presents algorithms that exploit the convergence behavior of individual components of the PageRank vector. Kamvar then extends the ideas of reputation management and personalized search to distributed networks like peer-to-peer and social networks. He highlights locality and computational considerations related to the structure of the network, and considers such unique issues as malicious peers. He describes the EigenTrust algorithm and applies various PageRank concepts to P2P settings. Discussion chapters summarizing results conclude the book's two main sections.Clear and thorough, this book provides an authoritative look at central innovations in search for all of those interested in the subject.A sweeping intellectual history of the role of wealth in the church in the last days of the Roman EmpireJesus…
taught his followers that it is easier for a camel to go through the eye of a needle than for a rich man to enter heaven. Yet by the fall of Rome, the church was becoming rich beyond measure. Through the Eye of a Needle is a sweeping intellectual and social history of the vexing problem of wealth in Christianity in the waning days of the Roman Empire, written by the world's foremost scholar of late antiquity.Peter Brown examines the rise of the church through the lens of money and the challenges it posed to an institution that espoused the virtue of poverty and called avarice the root of all evil. Drawing on the writings of major Christian thinkers such as Augustine, Ambrose, and Jerome, Brown examines the controversies and changing attitudes toward money caused by the influx of new wealth into church coffers, and describes the spectacular acts of divestment by rich donors and their growing influence in an empire beset with crisis. He shows how the use of wealth for the care of the poor competed with older forms of philanthropy deeply rooted in the Roman world, and sheds light on the ordinary people who gave away their money in hopes of treasure in heaven.Through the Eye of a Needle challenges the widely held notion that Christianity's growing wealth sapped Rome of its ability to resist the barbarian invasions, and offers a fresh perspective on the social history of the church in late antiquity.More stimulating mathematics puzzles from bestselling author Paul NahinHow do technicians repair broken communications cables at the bottom of the…
ocean without actually seeing them? What's the likelihood of plucking a needle out of a haystack the size of the Earth? And is it possible to use computers to create a universal library of everything ever written or every photo ever taken? These are just some of the intriguing questions that best-selling popular math writer Paul Nahin tackles in Number-Crunching. Through brilliant math ideas and entertaining stories, Nahin demonstrates how odd and unusual math problems can be solved by bringing together basic physics ideas and today's powerful computers. Some of the outcomes discussed are so counterintuitive they will leave readers astonished.Nahin looks at how the art of number-crunching has changed since the advent of computers, and how high-speed technology helps to solve fascinating conundrums such as the three-body, Monte Carlo, leapfrog, and gambler's ruin problems. Along the way, Nahin traverses topics that include algebra, trigonometry, geometry, calculus, number theory, differential equations, Fourier series, electronics, and computers in science fiction. He gives historical background for the problems presented, offers many examples and numerous challenges, supplies MATLAB codes for all the theories discussed, and includes detailed and complete solutions.Exploring the intimate relationship between mathematics, physics, and the tremendous power of modern computers, Number-Crunching will appeal to anyone interested in understanding how these three important fields join forces to solve today's thorniest puzzles.Computational Economics
Par David A. Kendrick, P. Ruben Mercado, Hans M. Amman. 2006
The ability to conceptualize an economic problem verbally, to formulate it as a mathematical model, and then represent the mathematics…
in software so that the model can be solved on a computer is a crucial skill for economists. Computational Economics contains well-known models--and some brand-new ones--designed to help students move from verbal to mathematical to computational representations in economic modeling. The authors' focus, however, is not just on solving the models, but also on developing the ability to modify them to reflect one's interest and point of view. The result is a book that enables students to be creative in developing models that are relevant to the economic problems of their times. Unlike other computational economics textbooks, this book is organized around economic topics, among them macroeconomics, microeconomics, and finance. The authors employ various software systems--including MATLAB, Mathematica, GAMS, the nonlinear programming solver in Excel, and the database systems in Access--to enable students to use the most advantageous system. The book progresses from relatively simple models to more complex ones, and includes appendices on the ins and outs of running each program. The book is intended for use by advanced undergraduates and professional economists and even, as a first exposure to computational economics, by graduate students. Organized by economic topics Progresses from simple to more complex models Includes instructions on numerous software systems Encourages customization and creativityDelphi: A History of the Center of the Ancient World
Par Michael Scott. 2014
A comprehensive narrative history of the ancient world's center, from its founding to its modern rediscoveryThe oracle and sanctuary of…
the Greek god Apollo at Delphi were known as the "omphalos"—the "center" or "navel"—of the ancient world for more than 1,000 years. Individuals, city leaders, and kings came from all over the Mediterranean and beyond to consult Delphi's oracular priestess; to set up monuments to the gods; and to take part in competitions.In this richly illustrated account, Michael Scott covers the history and nature of Delphi, from the literary and archaeological evidence surrounding the site, to its rise as a center of worship, to the constant appeal of the oracle despite her cryptic prophecies. He describes how Delphi became a contested sacred site for Greeks and Romans and a storehouse for the treasures of rival city-states and foreign kings. He also examines the eventual decline of the site and how its meaning and importance have continued to be reshaped.A unique window into the center of the ancient world, Delphi will appeal to general readers, tourists, students, and specialists.A Written Republic: Cicero's Philosophical Politics
Par Yelena Baraz. 2012
In the 40s BCE, during his forced retirement from politics under Caesar's dictatorship, Cicero turned to philosophy, producing a massive…
and important body of work. As he was acutely aware, this was an unusual undertaking for a Roman statesman because Romans were often hostile to philosophy, perceiving it as foreign and incompatible with fulfilling one's duty as a citizen. How, then, are we to understand Cicero's decision to pursue philosophy in the context of the political, intellectual, and cultural life of the late Roman republic? In A Written Republic, Yelena Baraz takes up this question and makes the case that philosophy for Cicero was not a retreat from politics but a continuation of politics by other means, an alternative way of living a political life and serving the state under newly restricted conditions. Baraz examines the rhetorical battle that Cicero stages in his philosophical prefaces--a battle between the forces that would oppose or support his project. He presents his philosophy as intimately connected to the new political circumstances and his exclusion from politics. His goal--to benefit the state by providing new moral resources for the Roman elite--was traditional, even if his method of translating Greek philosophical knowledge into Latin and combining Greek sources with Roman heritage was unorthodox. A Written Republic provides a new perspective on Cicero's conception of his philosophical project while also adding to the broader picture of late-Roman political, intellectual, and cultural life.The Silicon Jungle: A Novel of Deception, Power, and Internet Intrigue
Par Shumeet Baluja. 2011
A suspenseful story about the dangers of unknowingly revealing our most intimate thoughts and actions onlineWhat happens when a naive…
intern is granted unfettered access to people's most private thoughts and actions? Stephen Thorpe lands a coveted internship at Ubatoo, an Internet empire that provides its users with popular online services, from a search engine and e-mail, to social networking. When Stephen’s boss asks him to work on a project with the American Coalition for Civil Liberties, Stephen innocently obliges, believing he is mining Ubatoo’s vast databases to protect people unfairly targeted in the name of national security. But nothing is as it seems. Suspicious individuals surface, doing all they can to access Ubatoo’s wealth of confidential information. This need not require technical wizardry—simply knowing how to manipulate a well-intentioned intern may be enough.The Silicon Jungle is a cautionary fictional tale of data mining’s promise and peril. Baluja raises ethical questions about contemporary technological innovations, and how minute details can be routinely pieced together into rich profiles that reveal our habits, goals, and secret desires—all ready to be exploited.Trapped in the Net: The Unanticipated Consequences of Computerization
Par Gene I. Rochlin. 1998
Voice mail. E-mail. Bar codes. Desktops. Laptops. Networks. The Web. In this exciting book, Gene Rochlin takes a closer look…
at how these familiar and pervasive productions of computerization have become embedded in all our lives, forcing us to narrow the scope of our choices, our modes of control, and our experiences with the real world. Drawing on fascinating narratives from fields that range from military command, air traffic control, and international fund transfers to library cataloging and supermarket checkouts, Rochlin shows that we are rapidly making irreversible and at times harmful changes in our business, social, and personal lives to comply with the formalities and restrictions of information systems. The threat is not the direct one once framed by the idea of insane robots or runaway mainframes usurping human functions for their own purposes, but the gradual loss of control over hardware, software, and function through networks of interconnection and dependence. What Rochlin calls the computer trap has four parts: the lure, the snare, the costs, and the long-term consequences. The lure is obvious: the promise of ever more powerful and adaptable tools with simpler and more human-centered interfaces. The snare is what usually ensues. Once heavily invested in the use of computers to perform central tasks, organizations and individuals alike are committed to new capacities and potentials, whether they eventually find them rewarding or not. The varied costs include a dependency on the manufacturers of hardware and software--and a seemingly pathological scramble to keep up with an incredible rate of sometimes unnecessary technological change. Finally, a lack of redundancy and an incredible speed of response make human intervention or control difficult at best when (and not if) something goes wrong. As Rochlin points out, this is particularly true for those systems whose interconnections and mechanisms are so deeply concealed in the computers that no human being fully understands them.The Poetics of Eros in Ancient Greece
Par Claude Calame. 1999
The Poetics of Eros in Ancient Greece offers the first comprehensive inquiry into the deity of sexual love, a power…
that permeated daily Greek life. Avoiding Foucault's philosophical paradigm of dominance/submission, Claude Calame uses an anthropological and linguistic approach to re-create indigenous categories of erotic love. He maintains that Eros, the joyful companion of Aphrodite, was a divine figure around which poets constructed a physiology of desire that functioned in specific ways within a network of social relations. Calame begins by showing how poetry and iconography gave a rich variety of expression to the concept of Eros, then delivers a history of the deity's roles within social and political institutions, and concludes with a discussion of an Eros-centered metaphysics. Calame's treatment of archaic and classical Greek institutions reveals Eros at work in initiation rites and celebrations, educational practices, the Dionysiac theater of tragedy and comedy, and in real and imagined spatial settings. For men, Eros functioned particularly in the symposium and the gymnasium, places where men and boys interacted and where future citizens were educated. The household was the setting where girls, brides, and adult wives learned their erotic roles--as such it provides the context for understanding female rites of passage and the problematics of sexuality in conjugal relations. Through analyses of both Greek language and practices, Calame offers a fresh, subtle reading of relations between individuals as well as a quick-paced and fascinating overview of Eros in Greek society at large.Death to Tyrants!: Ancient Greek Democracy and the Struggle against Tyranny
Par David Teegarden. 2014
Death to Tyrants! is the first comprehensive study of ancient Greek tyrant-killing legislation--laws that explicitly gave individuals incentives to "kill…
a tyrant." David Teegarden demonstrates that the ancient Greeks promulgated these laws to harness the dynamics of mass uprisings and preserve popular democratic rule in the face of anti-democratic threats. He presents detailed historical and sociopolitical analyses of each law and considers a variety of issues: What is the nature of an anti-democratic threat? How would various provisions of the laws help pro-democrats counter those threats? And did the laws work? Teegarden argues that tyrant-killing legislation facilitated pro-democracy mobilization both by encouraging brave individuals to strike the first blow against a nondemocratic regime and by convincing others that it was safe to follow the tyrant killer's lead. Such legislation thus deterred anti-democrats from staging a coup by ensuring that they would be overwhelmed by their numerically superior opponents. Drawing on modern social science models, Teegarden looks at how the institution of public law affects the behavior of individuals and groups, thereby exploring the foundation of democracy's persistence in the ancient Greek world. He also provides the first English translation of the tyrant-killing laws from Eretria and Ilion. By analyzing crucial ancient Greek tyrant-killing legislation, Death to Tyrants! explains how certain laws enabled citizens to draw on collective strength in order to defend and preserve their democracy in the face of motivated opposition.428 AD: An Ordinary Year at the End of the Roman Empire
Par Giusto Traina. 2009
This is a sweeping tour of the Mediterranean world from the Atlantic to Persia during the last half-century of the…
Roman Empire. By focusing on a single year not overshadowed by an epochal event, 428 AD provides a truly fresh look at a civilization in the midst of enormous change--as Christianity takes hold in rural areas across the empire, as western Roman provinces fall away from those in the Byzantine east, and as power shifts from Rome to Constantinople. Taking readers on a journey through the region, Giusto Traina describes the empires' people, places, and events in all their simultaneous richness and variety. The result is an original snapshot of a fraying Roman world on the edge of the medieval era. The result is an original snapshot of a fraying Roman world on the edge of the medieval era. Readers meet many important figures, including the Roman general Flavius Dionysius as he encounters a delegation from Persia after the Sassanids annex Armenia; the Christian ascetic Simeon Stylites as he stands and preaches atop his column near Antioch; the eastern Roman emperor Theodosius II as he prepares to commission his legal code; and Genseric as he is elected king of the Vandals and begins to turn his people into a formidable power. We are also introduced to Pulcheria, the powerful sister of Theodosius, and Galla Placidia, the queen mother of the western empire, as well as Augustine, Pope Celestine I, and nine-year-old Roman emperor Valentinian III. Full of telling details, 428 AD illustrates the uneven march of history. As the west unravels, the east remains intact. As Christianity spreads, pagan ideas and schools persist. And, despite the presence of the forces that will eventually tear the classical world apart, Rome remains at the center, exerting a powerful unifying force over disparate peoples stretched across the Mediterranean.Discrete and Computational Geometry
Par Satyan L. Devadoss, Joseph O'Rourke. 2011
An essential introduction to discrete and computational geometryDiscrete geometry is a relatively new development in pure mathematics, while computational geometry…
is an emerging area in applications-driven computer science. Their intermingling has yielded exciting advances in recent years, yet what has been lacking until now is an undergraduate textbook that bridges the gap between the two. Discrete and Computational Geometry offers a comprehensive yet accessible introduction to this cutting-edge frontier of mathematics and computer science.This book covers traditional topics such as convex hulls, triangulations, and Voronoi diagrams, as well as more recent subjects like pseudotriangulations, curve reconstruction, and locked chains. It also touches on more advanced material, including Dehn invariants, associahedra, quasigeodesics, Morse theory, and the recent resolution of the Poincaré conjecture. Connections to real-world applications are made throughout, and algorithms are presented independently of any programming language. This richly illustrated textbook also features numerous exercises and unsolved problems.The essential introduction to discrete and computational geometryCovers traditional topics as well as new and advanced materialFeatures numerous full-color illustrations, exercises, and unsolved problemsSuitable for sophomores in mathematics, computer science, engineering, or physicsRigorous but accessibleAn online solutions manual is available (for teachers only).Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023 (Algorithms for Intelligent Systems)
Par I. Jeena Jacob, Selwyn Piramuthu, Przemyslaw Falkowski-Gilski. 2024
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and…
Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27–28, 2023. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator,…
a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.What You Will LearnRead new information and treat ECRM and cybersecurity as a value creatorReceive updates on legal cases, legislative actions, and regulations that are raising the stakes for organizations, their C-suites, and boardsThink differently about funding ECRM and cybersecurity initiativesUnderstand the most critical ECRM decision that boards must facilitate in their organizationsUse practical, tangible, actionable content to develop and document your ECRM program and cybersecurity strategy“This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust.” —Paul Connelly, First CISO at the White House and HCA Healthcare Who This Book Is ForThe primary audience includes Chief Information Security Officers, Chief Risk Officers, and Chief Compliance Officers. The secondary audience includes C-suite executives and board members. The tertiary audience includes any stakeholder responsible for privacy, security, compliance, and cyber risk management or students of these topics.Advances in Communication and Applications: Proceedings of ERCICA 2023, Volume 2 (Lecture Notes in Electrical Engineering #1105)
Par N. R. Shetty, N. H. Prasad, H. C. Nagaraj. 2024
This book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA) 2023.…
The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. Some of the topics include the Internet of Things (IoT), wireless communications, image and video processing, parallel and distributed computing, and smart grid applications, among others. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.Computational Diffusion MRI: 14th International Workshop, CDMRI 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings (Lecture Notes in Computer Science #14328)
Par Muge Karaman, Remika Mito, Elizabeth Powell, Francois Rheault, Stefan Winzeck. 2023
This book constitutes the proceedings of the 14th International Workshop, CDMRI 2023, held in conjunction with MICCAI 2023, the 26th…
International Conference on Medical Image Computing and Computer-Assisted Intervention. The conference took place in Vancouver, BC, Canada, on October 8, 2023. The 17regular papers presented in this book were carefully reviewed and selected from 19 submissions. These contributions cover various aspects, including preprocessing, signal modeling, tractography, bundle segmentation, and clinical applications. Many of these studies employ novel machine learning implementations, highlighting the evolving landscape of techniques beyond the more traditional physics-based algorithms.This book constitutes the proceedings of the CCF 18th International Conference on Computer-Aided Design and Computer Graphics, CAD/Graphics 2023, which took…
place in Shanghai, China, during August 19–21, 2023.The 23 full papers included in this book were carefully reviewed and selected from 169 submissions. They focus on topics such as computer graphics and CAD, 3D Printing and Computational Fabrication, 3D Vision, Bio-CAD and Nano-CAD, Computer Animation, Deep Learning for Graphics, Geometric Modeling, Geometry Processing, Rendering, Virtual Reality, Augmented Reality, Visualization, and more.Software Supply Chain Security
Par Cassie Crossley. 2024
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability…
can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.With this book, you'll learn how to:Pinpoint the cybersecurity risks in each part of your organization's software supply chainIdentify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurementDesign initiatives and controls for each part of the supply chain using existing frameworks and referencesImplement secure development lifecycle, source code security, software build management, and software transparency practicesEvaluate third-party risk in your supply chainThe NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.