You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Writing in a rigorous, thought-provoking style, the author takes us on a far-reaching tour through the philosophical ramifications of consciousness, offering provocative insights into the relationship between mind and brain.
Human beings have wondered about the stars since the dawn of the species. Does life exist out there – intelligent life, even – or are we alone? The quest for life in the universe touches on fundamental hopes and fears. It touches on the essence of what it means to formulate a theory, grasp a concept, and have an imagination. This book traces the history of the science of this area and the development of new schools in philosophy. Its essays seek to establish the history and philosophy of astrobiology as research fields in their own right by addressing cognitive, linguistic, epistemological, ethical, cultural, societal, and historical perspectives on astrobiology. The book is divided into...
Building a bridge between mathematicians and industry is both a chal lenging task and a valuable goal for the Institute for Mathematics and its Applications (IMA). The rationale for the existence of the IMA is to en courage interaction between mathematicians and scientists who use math ematics. Some of this interaction should evolve around industrial problems which mathematicians may be able to solve in "real time." Both Industry and Mathematics benefit: Industry, by increase of mathematical knowledge and ideas brought to bear upon their concerns, and Mathematics, through the infusion of exciting new problems. In the past ten months I have visited numerous industries and national laboratorie...
As computer technology is used to control critical systems to an increasing degree, it is vital that the methods for developing and understanding these systems are substantially improved. The mathematical and scientific foundations currently used are extremely limited which means that their correctness and reliability cannot be ensured to an acceptable level. Systems engineering needs to become a fully fledged scientific discipline and formal methods, which are characterised by their firm mathematical foundations, are playing a vital role in achieving this transition. This volume is based on the proceedings of the Formal Methods Workshop (FM91), held in Drymen, Scotland, 24-27 September 1991...
During the last decade, author Daryl McCullough faced the illness of his mother as she was battling cancer. After her death, he cleaned out his childhood desk and found an earlier draft of this story, which was written as a junior high school assignment. A metaphorical tale about understanding and coping with death, his ailing mother had left this manuscript for him to find again. With some rewriting along with inspiring illustrations by his talented aunt Maryanne Smith, they capture the essence and beauty of nature, while providing some insight into the mysteries of life, change, and death. The Story of Tree and Cloud, a picture book for children and adults, shares the story of an ages-old oak tree named Folie who lives on the top of a golden California coastal hillside. Throughout the seasons of her life, Folie sees and experiences many fascinating things, but she also experiences loss and the resulting grief. Soon, she comes to understand that her loved one's spirit lives on, and she finds solace in that.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.
This proceedings volume brings together some 189 peer-reviewed papers presented at the International Conference on Information Technology and Computer Application Engineering, held 27-28 August 2013, in Hong Kong, China. Specific topics under consideration include Control, Robotics, and Automation, Information Technology, Intelligent Computing and
Most aspects of our private and social lives—our safety, the integrity of the financial system, the functioning of utilities and other services, and national security—now depend on computing. But how can we know that this computing is trustworthy? In Mechanizing Proof, Donald MacKenzie addresses this key issue by investigating the interrelations of computing, risk, and mathematical proof over the last half century from the perspectives of history and sociology. His discussion draws on the technical literature of computer science and artificial intelligence and on extensive interviews with participants. MacKenzie argues that our culture now contains two ideals of proof: proof as tradition...
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent yea...