You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Humour is without doubt a vital element of the human condition but it has rarely been the subject of serious historical research. Yet a closer look at jokes and other comic phenomena shows us that the nature of humour changes from one period to another, and that these changes can provide us with important insights into the social and cultural developments of the past. This important and highly original book sets out to explore the terra incognita of humour through the ages - from jokes and stage humour in Greece and Rome to the jestbooks of early modern Europe, from practical jokes in Renaissance Italy to comic painting during the Dutch Golden Age, from Bakhtin's conception of laughter to the joking relationships of anthropologists. These innovative accounts move humour into the centre of social and cultural history and throw an unexpected light on life and manners through the ages.
Combining concepts from topology and algorithms, this book delivers what its title promises: an introduction to the field of computational topology. Starting with motivating problems in both mathematics and computer science and building up from classic topics in geometric and algebraic topology, the third part of the text advances to persistent homology. This point of view is critically important in turning a mostly theoretical field of mathematics into one that is relevant to a multitude of disciplines in the sciences and engineering. The main approach is the discovery of topology through algorithms. The book is ideal for teaching a graduate or advanced undergraduate course in computational topology, as it develops all the background of both the mathematical and algorithmic aspects of the subject from first principles. Thus the text could serve equally well in a course taught in a mathematics department or computer science department.
This report considers the biological and behavioral mechanisms that may underlie the pathogenicity of tobacco smoke. Many Surgeon General's reports have considered research findings on mechanisms in assessing the biological plausibility of associations observed in epidemiologic studies. Mechanisms of disease are important because they may provide plausibility, which is one of the guideline criteria for assessing evidence on causation. This report specifically reviews the evidence on the potential mechanisms by which smoking causes diseases and considers whether a mechanism is likely to be operative in the production of human disease by tobacco smoke. This evidence is relevant to understanding how smoking causes disease, to identifying those who may be particularly susceptible, and to assessing the potential risks of tobacco products.
The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the ...
This is the first textbook on pattern recognition to present the Bayesian viewpoint. The book presents approximate inference algorithms that permit fast approximate answers in situations where exact answers are not feasible. It uses graphical models to describe probability distributions when no other books apply graphical models to machine learning. No previous knowledge of pattern recognition or machine learning concepts is assumed. Familiarity with multivariate calculus and basic linear algebra is required, and some experience in the use of probabilities would be helpful though not essential as the book includes a self-contained introduction to basic probability theory.
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.
The Italian philosopher Giorgio Agamben has always been an original reader of texts, understanding their many rich and multiple historical, aesthetic, and political meanings and effects. In Profanations, Agamben has assembled for the first time some of his most pivotal essays on photography, the novel, and film. A meditation on memory and oblivion, on what is lost and what remains, Profanations proves yet again that Agamben is one of the most provocative writers of our times. In ten essays, Agamben rethinks approaches to a series of literary and philosophical problems: the relation between genius, ego, and theories of subjectivity; the problem of messianic time as explicated in both images a...
Prepared by the IUPAC Physical Chemistry Division this definitive manual, now in its third edition, is designed to improve the exchange of scientific information among the readers in different disciplines and across different nations. This book has been systematically brought up to date and new sections added to reflect the increasing volume of scientific literature and terminology and expressions being used. The Third Edition reflects the experience of the contributors with the previous editions and the comments and feedback have been integrated into this essential resource. This edition has been compiled in machine-readable form and will be available online.