Résultats de recherche de titre
Articles 1 à 20 sur 3090
Agent Josephine: American Beauty, French Hero, British Spy
Par Damien Lewis. 2022
The New Yorker, Best Books of 2022 Vanity Fair, Best Books of 2022 Booklist, Best Books of 2022 Singer. Actress.…
Beauty. Spy. During WWII, Josephine Baker, the world's richest and most glamorous entertainer, was an Allied spy in Occupied France. Prior to World War II, Josephine Baker was a music-hall diva renowned for her singing and dancing, her beauty and sexuality; she was the highest-paid female performer in Europe. When the Nazis seized her adopted city, Paris, she was banned from the stage, along with all &“negroes and Jews.&” Yet instead of returning to America, she vowed to stay and to fight the Nazi evil. Overnight, she went from performer to Resistance spy. In Agent Josephine, bestselling author Damien Lewis uncovers this little-known history of the famous singer&’s life. During the war years, as a member of the French Nurse paratroopers—a cover for her spying work—Baker participated in numerous clandestine activities and emerged as a formidable spy. In turn, she was a hero of the three countries in whose name she served—the US, France, and Britain. Drawing on a plethora of new historical material and rigorous research, including previously undisclosed letters and journals, Lewis upends the conventional story of Josephine Baker, explaining why she fully deserves her unique place in the French Panthéon.Efficient Go
Par Bartlomiej Plotka. 2023
With technological advancements, fast markets, and higher complexity of systems, software engineers tend to skip the uncomfortable topic of software…
efficiency. However, tactical, observability-driven performance optimizations are vital for every product to save money and ensure business success. With this book, any engineer can learn how to approach software efficiency effectively, professionally, and without stress. Author Bartłomiej Płotka provides the tools and knowledge required to make your systems faster and less resource-hungry. Efficient Go guides you in achieving better day-to-day efficiency using Go. In addition, most content is language-agnostic, allowing you to bring small but effective habits to your programming or product management cycles. This book shows you how to: Clarify and negotiate efficiency goalsOptimize efficiency on various levelsUse common resources like CPU and memory effectivelyAssess efficiency using observability signals like metrics, logging, tracing, and (continuous) profiling via open source projects like Prometheus, Jaeger, and ParcaApply tools like go test, pprof, benchstat, and k6 to create reliable micro and macro benchmarksEfficiently use Go and its features like slices, generics, goroutines, allocation semantics, garbage collection, and more!Discover a fascinating look into the lives of six historic trailblazers in this World War II-era story of the American…
women who programmed the world's first modern computer. After the end of World War II, the race for technological supremacy sped on. Top-secret research into ballistics and computing, begun during the war to aid those on the front lines, continued across the United States as engineers and programmers rushed to complete their confidential assignments. Among them were six pioneering women, tasked with figuring out how to program the world's first general-purpose, programmable, all-electronic computer—better known as the ENIAC—even though there were no instruction codes or programming languages in existence. While most students of computer history are aware of this innovative machine, the great contributions of the women who programmed it were never told—until now. Over the course of a decade, Kathy Kleiman met with four of the original six ENIAC Programmers and recorded extensive interviews with the women about their work. Proving Ground restores these women to their rightful place as technological revolutionaries. As the tech world continues to struggle with gender imbalance and its far-reaching consequences, the story of the ENIAC Programmers' groundbreaking work is more urgently necessary than ever before, and Proving Ground is the celebration they deserve.Queens of a Fallen World: The Lost Women of Augustine's Confessions
Par Kate Cooper. 2023
FINALIST: THE CUNDILL HISTORY PRIZE 2023The vibrant and surprising lives of the women in Augustine's Confessions While many know of…
Saint Augustine and his Confessions, few are aware of how his life and thought were influenced by women.Queens of a Fallen World tells a story of betrayal, love, and ambition in the ancient world as seen through a woman's eyes. Historian Kate Cooper introduces us to four women whose hopes and plans collided in Augustine's early adulthood: his mother, Monnica of Thagaste; his lover; his fiancée; and Justina, the troubled empress of ancient Rome. Drawing upon their depictions in the Confessions, Cooper skilfully reconstructs their lives against the backdrop of their fourth-century society. Though they came from different walks of life, each found her own way of prevailing in a world ruled by men. A refreshingly complex and compelling portrait of Augustine, Queens of a Fallen World is the riveting story of four remarkable women who set him on course to change history.Meganets: How Digital Forces Beyond Our Control Commandeer Our Daily Lives and Inner Realities
Par David B. Auerbach. 2023
How the autonomous digital forces jolting our lives – as uncontrollable as the weather and plate tectonics – are transforming life, society,…
culture, and politics.David Auerbach&’s exploration of the phenomenon he has identified as the meganet begins with a simple, startling revelation: There is no hand on the tiller of some of the largest global digital forces that influence our daily lives: from corporate sites such as Facebook, Amazon, Google, YouTube, Instagram, and Reddit to the burgeoning metaverse encompassing cryptocurrencies and online gaming to government systems such as China&’s Social Credit System and India&’s Aadhaar.As we increasingly integrate our society, culture and politics within a hyper-networked fabric, Auerbach explains how the interactions of billions of people with unfathomably large online networks have produced a new sort of beast: ever-changing systems that operate beyond the control of the individuals, companies, and governments that created them.Meganets, Auerbach explains, have a life of their own, actively resisting attempts to control them as they accumulate data and produce spontaneous, unexpected social groups and uprisings that could not have even existed twenty years ago. And they constantly modify themselves in response to user behavior, resulting in collectively authored algorithms none of us intend or control. These enormous invisible organisms exerting great force on our lives are the new minds of the world, increasingly commandeering our daily lives and inner realities.Auerbach&’s analysis of these gargantuan opaque digital forces yield important insights such as:The conventional wisdom that the Googles and Facebook of this world are tightly run algorithmic entities is a myth. No one is really in control.The efforts at reform - to get lies and misinformation off meganets - run into a brick wall because the companies and executives who run them are trapped by the persistent, evolving, and opaque systems they have created.Bitcoin and other cryptocurrencies are uncontrollable and their embrace by elite financial institutions threatens the entire economyWe are asking the wrong questions in assuming that if only the Facebooks of this world could be better regulated or broken up that they would be better, more ethical citizens.Why questions such as making algorithms fair and bias-free and whether AI can be a tool for good or evil are wrong and misinformedAuerbach then comes full circle, showing that while we cannot ultimately control meganets we can tame them through the counterintuitive measures he describes in detail.This book is an in-depth study of the Indo-Pacific region for effective interventions in the megacities system. First, based on…
several criteria, the region is identified as homogeneous country groupings of diversity, a multi-polar spatial system, and as program regions of QUAD and I2U2 for action programs and investment transcending many nations but mostly the ocean space of the Indo-Pacific, connecting all megacities sub-regions spatially and functionally. Then, the megacities with problems and prospects for economic integration are studied from the point of view of regional economics and international trade, and finally, the rural–urban interface with case studies of selected countries is presented. Prospects of systems of megacities and individual megacities for regional economies are designed. Existing interconnections through rail, air, and ocean of megacity systems, their capacity, performance, and potential are analyzed for emerging issues. International trade among the megacity systems/countries with emerging issues and barriers are presented. The mobility of money, goods, and services among the systems of megacities is analyzed. Rule-based diplomacy and other emerging options are discussed to sustain the above calls for a study of the Security of the Indo-Pacific region. Finally, the emerging architecture for megacity system governance is also presented.Out of 21 megacities in the Indo-Pacific, an in-depth study of a few in India and Japan in the Indo-Pacific region for effective economic interventions in the megacities system at the city level was studied. COVID-19 has affected most of the countries in the Indo-Pacific. With a contraction of GDP and a GDP growth rate negative, the number below the poverty level increased. Foreign Direct Investment is not forthcoming in any of these countries. Job creation becomes a priority in addition to public health concerns connected with COVID-19.Chinese Language Resources: Data Collection, Linguistic Analysis, Annotation and Language Processing (Text, Speech and Language Technology #49)
Par Chu-Ren Huang, Shu-Kai Hsieh, Peng Jin. 2023
Based on the accumulation of research experience and knowledge over the past 30 years, this volume lays out the research…
issues posed by the construction of various types of Chinese language resources, how they were resolved, and the implication of the solutions for future Chinese language processing research. This volume covers 30 years of development in Chinese language processing, focusing on the impact of conscientious decisions by some leading research groups. It focuses on constructing language resources, which led to thriving research and development of expertise in Chinese language technology today. Contributions from more than 40 leading scholars from various countries explore how Chinese language resources are used in current pioneering NLP research, the future challenges and their implications for computational and theoretical linguistics.The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application…
of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.Electrical Machines and Their Applications
Par Ali Mehrizi-Sani. 2024
This popular, easy-to-read book offers a comprehensive yet unique treatment of electrical machines and their historical development. Electrical Machines and…
Their Applications, Third Edition covers an in-depth analysis of machines augmented with ample examples, which makes it suitable for both those who are new to electric machines and for those who want to deepen their knowledge of electric machines. This book provides a thorough discussion of electrical machines. It starts by reviewing the basics of concepts needed to fully understand the machines, e.g., three-phase circuits and fundamentals of energy conversion, and continues to discuss transformers, induction machines, synchronous machines, dc machines, and other special machines and their dynamics. This natural progression creates a unifying theme and helps the reader appreciate how the same physical laws of energy conversion govern the operation and dynamics of different machine types. The text is sprinkled with ample examples to further solidify the discussed concepts. Several well-placed appendices make the book self-contained and even easier to follow. This book is part of a series on power system topics originally authored by the late Turan Gönen. The book has been edited by Ali Mehrizi-Sani to bring it up to date while maintaining its original charm. Both new and seasoned readers for Gönen’s books will find this new edition a much-awaited update to the second edition.Cyber Security for Next-Generation Computing Technologies
Par Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz. 2024
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to…
individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES • Highlights innovative principles and practices using next generation computing technologies based cybersecurity. • Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity • Offers an overview of theoretical, practical, simulation concepts of cybersecurityThe eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application…
of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.Verification and Evaluation of Computer and Communication Systems: 16th International Conference, VECoS 2023, Marrakech, Morocco, October 18–20, 2023, Proceedings (Lecture Notes in Computer Science #14368)
Par Belgacem Ben Hedia, Yassine Maleh, Moez Krichen. 2024
This book constitutes the refereed proceedings of the 16th International Conference on Verification and Evaluation of Computer and Communication Systems,…
VECoS 2023, held in Marrakech, Morocco, during October 18–20, 2023. The 12 full papers included in this book were carefully reviewed and selected from 36 submissions. The topics presented covered a range of subjects, including approaches to improving the scalability and efficiency of formal verification and their applications to blockchain, smart contracts and neural networks.Künstliche Intelligenz: Leitfaden zur soziotechnischen Gestaltung von KI-Systemen (ifaa-Edition)
Par Sascha Stowasser. 2023
Dies ist ein Handbuch für Unternehmen, Verbände und Beratungsgesellschaften, die die Potenziale von KI-Systemen in kleinen und mittleren Unternehmen erschließen…
wollen. Wie muss KI in Unternehmen eingeführt werden, um die Potenziale von KI gleichermaßen für Unternehmen und Beschäftigte zu nutzen? Im Buch geht es um die Frage, wie man KI-gestützte Arbeitssysteme so gestalten kann, dass sie den Anforderungen seitens der Technik, der Organisation und der Beschäftigten gerecht werden. Das Handbuch bietet praxisnahe Vorgehensweisen, die den aktuellen Stand der Wissenschaft mit Erfahrungen aus der betrieblichen Praxis verbinden. Der Leser erhält wertvolle Tipps und Strategien für die Zukunft der Arbeit. Ein Muss für alle, die die Chancen von KI nutzen wollen, ohne die Bedürfnisse der Beschäftigten zu vernachlässigen.The Company She Keeps
Par Georgia Durante. 2008
A female Goodfellas—the true story of A supermodel turned getaway driver for the mob.All-American beauty Georgia Durante was one of…
the most photographed models in the country when she married mobster Joe Lamendola. It plunged her into a world she never dreamed of—and one she feared she’d never survive—as a getaway driver for the Mafia and an eyewitness to unspeakable violence, brutality, and murder, as she came to understand the terrifying risk of being married to the Mob.Artificial Intelligence for Bone Disorder: Diagnosis and Treatment
Par Rishabha Malviya, Shivam Rajput, Makarand Vaidya. 2024
ARTIFICIAL INTELLIGENCE FOR BONE DISORDER The authors have produced an invaluable resource that connects the fields of AI and bone…
treatment by providing essential insights into the current state and future of AI in bone condition diagnosis and therapy, as well as a methodical examination of machine learning algorithms, deep learning approaches, and their real-world uses. The book explores the use of artificial intelligence (AI) in the diagnosis and treatment of various bone illnesses. The integration of AI approaches in the fields of orthopedics, radiography, tissue engineering, and other areas related to bone are discussed in detail. It covers tissue engineering methods for bone regeneration and investigates the use of AI tools in this area, emphasizing the value of deep learning and how to use AI in tissue engineering efficiently. The book also covers diagnostic and prognostic uses of AI in orthopedics, such as the diagnosis of disorders involving the hip and knee as well as prognoses for therapies. Chapters also look at MRI, trabecular biomechanical strength, and other methods for diagnosing osteoporosis. Other issues the book examines include several uses of AI in pediatric orthopedics, 3D modeling, digital X-ray radiogrammetry, convolutional neural networks for customized care, and digital tomography. With information on the most recent developments and potential future applications, each chapter of the book advances our understanding of how AI might be used to diagnose and treat bone problems. Audience This book will serve as a guide for orthopedic experts, biomedical engineers, faculty members, research scholars, IT specialists, healthcare workers, and hospital administrators.Computational Drug Discovery: Methods and Applications
Par Vasanthanathan Poongavanam, Vijayan Ramaswamy. 2024
Computational Drug Discovery A comprehensive resource that explains a wide array of computational technologies and methods driving innovation in drug…
discovery Computational Drug Discovery: Methods and Applications (2 volume set) covers a wide range of cutting-edge computational technologies and computational chemistry methods that are transforming drug discovery. The book delves into recent advances, particularly focusing on artificial intelligence (AI) and its application for protein structure prediction, AI-enabled virtual screening, and generative modeling for compound design. Additionally, it covers key technological advancements in computing such as quantum and cloud computing that are driving innovations in drug discovery. Furthermore, dedicated chapters that addresses the recent trends in the field of computer aided drug design, including ultra-large-scale virtual screening for hit identification, computational strategies for designing new therapeutic modalities like PROTACs and covalent inhibitors that target residues beyond cysteine are also presented. To offer the most up-to-date information on computational methods utilized in computational drug discovery, it covers chapters highlighting the use of molecular dynamics and other related methods, application of QM and QM/MM methods in computational drug design, and techniques for navigating and visualizing the chemical space, as well as leveraging big data to drive drug discovery efforts. The book is thoughtfully organized into eight thematic sections, each focusing on a specific computational method or technology applied to drug discovery. Authored by renowned experts from academia, pharmaceutical industry, and major drug discovery software providers, it offers an overview of the latest advances in computational drug discovery. Key topics covered in the book include: Application of molecular dynamics simulations and related approaches in drug discovery The application of QM, hybrid approaches such as QM/MM, and fragment molecular orbital framework for understanding protein-ligand interactions Adoption of artificial intelligence in pre-clinical drug discovery, encompassing protein structure prediction, generative modeling for de novo design, and virtual screening. Techniques for navigating and visualizing the chemical space, along with harnessing big data to drive drug discovery efforts. Methods for performing ultra-large-scale virtual screening for hit identification. Computational strategies for designing new therapeutic models, including PROTACs and molecular glues. In silico ADMET approaches for predicting a variety of pharmacokinetic and physicochemical endpoints. The role of computing technologies like quantum computing and cloud computing in accelerating drug discovery This book will provide readers an overview of the latest advancements in computational drug discovery and serve as a valuable resource for professionals engaged in drug discovery.Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
Par Roger A. Grimes. 2024
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do…
To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.R Programming for Actuarial Science
Par Peter McQuire, Alfred Kume. 2024
R Programming for Actuarial Science Professional resource providing an introduction to R coding for actuarial and financial mathematics applications, with…
real-life examples R Programming for Actuarial Science provides a grounding in R programming applied to the mathematical and statistical methods that are of relevance for actuarial work. In R Programming for Actuarial Science, readers will find: Basic theory for each chapter to complement other actuarial textbooks which provide foundational theory in depth. Topics covered include compound interest, statistical inference, asset-liability matching, time series, loss distributions, contingencies, mortality models, and option pricing plus many more typically covered in university courses. More than 400 coding examples and exercises, most with solutions, to enable students to gain a better understanding of underlying mathematical and statistical principles. An overall basic to intermediate level of coverage in respect of numerous actuarial applications, and real-life examples included with every topic. Providing a highly useful combination of practical discussion and basic theory, R Programming for Actuarial Science is an essential reference for BSc/MSc students in actuarial science, trainee actuaries studying privately, and qualified actuaries with little programming experience, along with undergraduate students studying finance, business, and economics.Blockchain Essentials: Core Concepts and Implementations
Par Ramchandra Sharad Mangrulkar, Pallavi Vijay Chavan. 2024
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using…
a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you need to gain a firm understanding of blockchain and how to implement it. The book begins with an introduction to the fundamentals of blockchain technology, followed by a review of its types, framework, applications and challenges. Moving ahead, you will learn basic blockchain programming with hash functions, authentication code, and Merkle trees. You will then dive into the basics of bitcoin, including wallets, digital keys, transactions, digital signatures, and more. This is followed by a crash course on Ethereum programming, its network, and ecosystem. As you progress through the book, you will also learn about Hyperledger and put your newly-gained knowledge to work through case studies and example applications. After reading this book, you will understand blockchain’s underlying concepts and its common implementations. What You Will Learn Master theoretical and practical implementations of various blockchain components using PythonImplement hashing, Merkel trees, and smart contracts using the Solidity programming language for various applicationsGrasp the internal structure of EVM and its implementation in smart contractsUnderstand why blockchain plays an essential role in cryptocurrencies and identify possible applications beyond cryptocurrenciesInvestigate and apply alternative blockchain solutions using Hyperledger, including its integration and deploymentExplore research opportunities through case studies and gain an overview of implementation using various languages Who Is This Book For: Anyone who is new to blockchain and wants to gain an an understanding of how it works and can be implemented.Medical Imaging and Computer-Aided Diagnosis: Proceedings of 2022 International Conference on Medical Imaging and Computer-Aided Diagnosis (MICAD 2022) (Lecture Notes in Electrical Engineering #810)
Par Ruidan Su, Yudong Zhang, Han Liu, Alejandro F Frangi. 2023
This book covers virtually all aspects of image formation in medical imaging, including systems based on ionizing radiation (x-rays, gamma…
rays) and non-ionizing techniques (ultrasound, optical, thermal, magnetic resonance, and magnetic particle imaging) alike. In addition, it discusses the development and application of computer-aided detection and diagnosis (CAD) systems in medical imaging. Given its coverage, the book provides both a forum and valuable resource for researchers involved in image formation, experimental methods, image performance, segmentation, pattern recognition, feature extraction, classifier design, machine learning / deep learning, radiomics, CAD workstation design, human–computer interaction, databases, and performance evaluation.