You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The subject of argumentation has been studied since ancient times, but it has seen major innovations since the advent of the computer age. Software already exists which can create and evaluate arguments in high-stake situations, such as medical diagnosis and criminal investigation; formal systems can help us appreciate the role of the value judgments which underlie opposing positions; and it is even possible to enter into argumentative dialogues as if playing a computer game. This book presents the 28 full papers, 17 short papers and a number of system demonstrations, described in an extended abstract, from the 2012 biennial Computational Models of Argument (COMMA) conference, held in Vienna...
Since its first appearance in 1967, Russell Harper's classic study of Canadian painting has been recognized as the outstanding authority on the subject. This edition provides a comprehensive survey, generously illustrated, of three centuries of Canadian painting from its beginnings in the seventeenth century. Through a lively combination of entertaining anecdotes, descriptions of the cultural background, biographical accounts, and critical judgement, the reader comes to know intimately the artists, their paintings, and their environments. Included are 173 reproductions - 45 added since the first addition. They all ow the reader to see representative works from all periods, and provide a visual record of the cultural and social history of Canada.
With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features whi...
During the past few years there has been an dramatic upsurge in research and development, implementations of new technologies, and deployments of actual solutions and technologies in the diverse application areas of embedded systems. These areas include automotive electronics, industrial automated systems, and building automation and control. Comprising 48 chapters and the contributions of 74 leading experts from industry and academia, the Embedded Systems Handbook, Second Edition presents a comprehensive view of embedded systems: their design, verification, networking, and applications. The contributors, directly involved in the creation and evolution of the ideas and technologies presented...
“An epic story, filled with an unfolding array of evocatively described landscapes and sharply drawn, unforgettable people.” —Dayton Duncan, writer and producer for Ken Burns documentary films and author of fourteen books on American history and national parks Edwin Land had barely settled into his seat on the plane when the flash went off. An idea for an innovative WWII technology that might help eradicate the fascist cancer devouring the free world. It was Polaroid’s Optical Ring Sight, which magically projected a bullseye of brilliantly colored rings onto the sky—like rings of fire—to aim American antiaircraft guns that previously “couldn’t hit the broad side of a barn.”...