By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
Computer mogul Johnny Ornelas escapes the corporate life to settle down on the beautiful island of Saipan. He buys a luxury hotel and plans to make a life in his new, tropical climate. Then he hears t
Emil Lime and his kooky wife Abigail visit a newspaper office in California where Emil has been hired to solve a difficult computer problem. Aside from the editor and his lovely wife, they encounter a
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Engineers and scientists need to have an introduction to the basics of linear algebra in a context they understand. Computer algebra systems make the manipulation of matrices and the determination of
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying light cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
Imagine a life of virtual reality -- a childhood contained in a controlled environment, with no human contact or experiences outside of the world of computer-generated images.Corgan has been genetical
What's worse than spam, more dangerous than cyber sex, and scarier than getting a computer virus? An Instant Message from the guy who got away ten years ago... grayscale: amber fleece? is that you? f
This book constitutes the refereed proceedings of the 28th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2002, held in Cesky Krumlov, Czech Republic in June 2002.The 36 re
Hurt No More No one who works at a computer or drives a car will be surprised to learn that neck pain is on the rise. About 70 million people in the United States have had neck pain, and the incidenc
* When should children start using computers? * How should schools incorporate computer use into their curriculum? * Which types of computer software programs should be avoided? * Are children who don
From an overview of how the Internet works--including a primer on computer communication and explanations of how providers like America Online, CompuServe, Microsoft Network, and the many lesser-known
Defining the limits of computer technology, the authors make a compelling case that binary logic will always be inferior to human intuitive ability. A stunning reaffirmation of human intelligence.
The title of this book is a pun on the use of the preposition “onto” with the aim of recalling “Ontology”, the term commonly adopted in the computer science community to indicate the study of the form
Tell Me No Lies by Rosemary Austin It is the mid-1980s. Shelley Morgan, a slim, blonde, technical editor in Orlando, works for a leading computer magazine. When Shelley's mother gives her husband's fa
Pilates speak only one language. He has a small business in a mid-sized town which he runs somewhat efficiently; yet, Pilates went from being a small time computer repairman to a world renown linguist
Over the past decade the field of Human-Computer Interaction has evolved from the study of the usability of interactive products towards a more holistic understanding of how they may mediate desired h
This is a short novel by science fiction, in which an aggressive computer virus that is transmitted over the Internet affects the behaviour of those who come into contact with it when working with com
This is a short novel by science fiction, in which an aggressive computer virus that is transmitted over the Internet affects the behaviour of those who come into contact with it when working with com
Hugh Wilkie is an officer of the Colonial Fleet. The only person alive able to meld his mind with the HCSIS computer. A system capable of not just controlling a Dread Naught but mankind s last hope in
Sid, a young computer scientist who is passionate about his profession, yearns to also serve his country. Helped by his professor, Sid accepts a job at the CIA where he can do both. But the forces of
Sid, a young computer scientist who is passionate about his profession, yearns to also serve his country. Helped by his professor, Sid accepts a job at the CIA where he can do both. But the forces of
This collection of 21 articles on video games and education showcases current scholarship in a wide variety of topics related to gaming and games as instructional tools. Beginning with an introduction
This book constitutes the refereed proceedings of the IFIP WG 9.7 International Conference on the History of Computing, HC 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisban
In this eloquent first-person account of a family drama that changed the face of American business, the man who transformed IBM into the world's largest computer company reflects on his lifelong partn
TOP 5 REASONS TO HATE THE MILLENNIUM 5. No one knows how to spell it 4. There will be a Rolling Stones Millennium Tour 3. Your new computer program may be Curtains 2000 2. As a kid you figured out
EVERYTHING YOU THINK YOU KNOW IS WRONG...That was the strange message left on Cory Maddox's e-mail--just at the moment when years of work on a revolutionary subspace computer system was about to pay o
This engaging and accessible book presents a set of representative concepts connected by the theme of information security, demonstrating how each allows us to solve real problems. The discussions are
In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software des