Showing 201 - 220 results of 874 for search '"Computer Scientist"', query time: 0.16s Refine Results
  1. 201

    Digital phenotyping, behavioral sensing, or personal sensing: names and transparency in the digital age by David C. Mohr, Katie Shilton, Matthew Hotopf

    Published 2020-03-01
    “…Abstract Data from networked sensors, such as those in our phones, are increasingly being explored and used to identify behaviors related to health and mental health. While computer scientists have referred to this field as context sensing, personal sensing, or mobile sensing, medicine has more recently adopted the term digital phenotyping. …”
    Get full text
    Article
  2. 202

    Verspera, du plan d’époque à la visite virtuelle : une fructueuse collaboration interdisciplinaire by Michel Jordan, Delphine Desbourdes, Nicolas Priniotakis, Wassim Swaileh, Benjamin Ringot, Mathieu da Vinha

    Published 2023-07-01
    “…In the Verspera project, historians, archivists, curators and computer scientists worked together on the very rich corpus of the Ancien Régime plans of the Château de Versailles. …”
    Get full text
    Article
  3. 203

    Taking a magnifying glass to data center operations by Foy, Kylie

    Published 2022
    “…The goal is to empower computer scientists and data center operators to better understand avenues for data center optimization.…”
    Get full text
    Article
  4. 204

    Creativity and critique: Gap analysis of support for critical research on Big Data by Howard, P, Shorey, S, Woolley, S, Guo, M

    Published 2016
    “…First, social and computer scientists are finding ways to catalog and demonstrate how algorithmic control can be exercised and abused. …”
    Report
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209

    Python for Everyone / by Horstmann, Cay S., 1959-, author 227816, Necaise, Rance D., author 513943

    Published [201
    “…It is suitable for a first course in programming for computer scientists, engineers, and students in other disciplines. …”
    text
  10. 210

    Cybersecurity Issues, Challenges, and Solutions in the Business World / by Verma, Suhasini, 1976-, editor 651877, Vyas, Vidhisha, 1980-, editor 651878, Kaushik, Keshav, editor 651879, IGI Global (Online service) 631983

    Published 2023
    “…Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.…”
    Get full text
    software, multimedia
  11. 211

    Editors' Note by Ellen R. Cohn, Jana Cason

    Published 2016-07-01
    “…The contributors to this issue are notably multi-disciplinary and include an audiologist, computer scientists, engineers, an epidemiologist, occupational therapists, a rehabilitation counselor, a physician (physical medicine and rehabilitation), and speech-language pathologists. …”
    Get full text
    Article
  12. 212
  13. 213
  14. 214

    Building a repository for record linkage by Susan Hautaniemi Leonard, Abay Israel, Margaret Levenstein, Trent Alexander

    Published 2018-10-01
    “…ICPSR is building LinkageLibrary, a repository and community space for researchers involved in linking and combining datasets, as a collaboration between social, statistical, and computer scientists. Unlike surveys or experiments where causal and outcome variables are measured in tandem, it is often necessary when working with organic, non-design data to link to other measures. …”
    Get full text
    Article
  15. 215

    How NOT to create a digital media scholarship platform: the history of the Sophie 2.0 project by Jasmine Simone Kirby

    Published 2019-02-01
    “…Sophie 1.0, from the University of Southern California, the Institute for the Future of the Book (IFB), and computer scientists based in Europe, was an attempt to create a multimedia editing, reading, and publishing platform. …”
    Get full text
    Article
  16. 216

    Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence / by Rawat, Romil, 1986-, editor 651918, Telang, Shrikant, editor 651919, William, P., editor 651924, Kaur, Upinder, editor 651921, Om Kumar, C.U., editor 651923, IGI Global (Online service) 631983

    Published 2022
    “…Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.…”
    Get full text
    software, multimedia
  17. 217

    The Ontological Foundations of Digital Art by Róisín Lally

    Published 2018-12-01
    “…But with that power comes an enormous political and ethical responsibility, a responsibility too often ignored by programmers and computer scientists. This paper uses the work of Denis Schmidt and Jacques Taminiaux as important resources for developing a Heideggerian response to this lack.…”
    Get full text
    Article
  18. 218
  19. 219
  20. 220