Databases Useful for Computer Science and Information Science Research: R



.


Databases Useful for Computer Science 

and Information Science Research: R


.

GOOGLE SITES CIS RESEARCH GUIDE SITE MAP DATABASES

 

AMOUNT OF CIS CONTENT IN A WIDE RANGE OF DATABASES 
WITH CONTENT SAMPLES FOR SOME

 

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE 
FROM SELECTED SEARCH ENGINES DISCOVERY TOOLS

http://tinyurl.com/ya4oggx9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   A THROUGH  B

http://tinyurl.com/ydg8z52h

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C   PART ONE

http://tinyurl.com/y9my4ppp

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C    PART TWO

http://tinyurl.com/yc4sfdta

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   D

http://tinyurl.com/yay8pkc3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   E    PART ONE

http://tinyurl.com/ydamheob

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:    E    PART TWO

http://tinyurl.com/y72w6xq6

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:     F THROUGH G

http://tinyurl.com/ydbxj5o7

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT: 
H THROUGH INGENTA
 

http://tinyurl.com/y9vj85y6

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    INSPEC THROUGH  L

http://tinyurl.com/yaxurho3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    M THROUGH MLA

http://tinyurl.com/yct8k9o9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    MLA THROUGH N

http://tinyurl.com/ydeyt2d7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   O

http://tinyurl.com/y8kh4r5u

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART ONE

http://tinyurl.com/ybe63hl7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART TWO
POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT

http://tinyurl.com/y9s24mth

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    PSY THROUGH PZ

http://tinyurl.com/ydgwy6zp

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:   R

http://tinyurl.com/yapzpw7a

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:    S THROUGH SCOPUS

http://tinyurl.com/ydylk7f2

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:
SEARCH.BIOPREPRINT THROUGH SZ

http://tinyurl.com/y8aajt3x

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:     T THROUGH Z

http://tinyurl.com/ya2qprg5

 

 

 



.




.


"computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence"



.



R2 Library 
12,563 Results


CONTENT SAMPLE


Chapter 2 - Introduction to Information, Information Science, and Information Systems

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Introduction to Information, Information Science, and Information Systems Kathleen Mastrian and Dee McGonigle Objectives • Reflect on the progression from data to information to knowledge . • Describe the term...

 

Chapter 2 - Introduction to Information, Information Science, and Information Systems | Section: Information Science and the Foundation of Knowledge

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Information Science and the Foundation of Knowledge Information science is a multidisciplinary science that encompasses aspects of computer...

 

Chapter 2 - Introduction to Information, Information Science, and Information Systems | Section: Information Science

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Information Science Information science has evolved over the last 50 or so years as a field of scientific inquiry and professional practice. It can be thought of as the science of...

 

Chapter 4 - Introduction to Cognitive Science and Cognitive Informatics | Section: What Is AI?

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

What Is AI? The field of AI deals with the conception, development, and implementation of informatics tools based on intelligent technologies. This field captures the complex processes of human thought and intelligence . Herbert...

 

Chapter 4 - Introduction to Cognitive Science and Cognitive Informatics | Section: Cognitive Informatics and Nursing Practice

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Cognitive Informatics and Nursing Practice According to Mastrian ( 2008 ), the recognition of the potential application of principles of cognitive science to NI is relatively new. The traditional and widely accepted definition of...

 

Chapter 22 - Data Mining as a Research Tool | Section: Data Mining Concepts

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Data Mining Concepts Bagging is a term for the use of voting and averaging in predictive data mining to synthesize the predictions from many models or methods or the use of the...

 

Chapter 22 - Data Mining as a Research Tool

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Data Mining as a Research Tool Dee McGonigle and Kathleen Mastrian Objectives • Describe big data . • Assess knowledge discovery in data. • Explore data mining . • Compare...

 

Chapter 21 - JOINT LEARNING USING MULTIPLE TYPES OF DATA AND KNOWLEDGE | Section: 1. INTRODUCTION

Medical Informatics, 1st; Hsinchun Chen, Sherrilynne Fuller, Carol Friedman, William Hersh, Springer Nature, 2005

1. INTRODUCTION The past decade has witnessed an explosive growth of biomedical research attributed to technological advances and the completion of genome projects for a variety of species. Genomic and proteomic technologies such as DNA microarray,...

 

Chapter 21 - JOINT LEARNING USING MULTIPLE TYPES OF DATA AND KNOWLEDGE | Section: 5. CONCLUSIONS AND DISCUSSION

Medical Informatics, 1st; Hsinchun Chen, Sherrilynne Fuller, Carol Friedman, William Hersh, Springer Nature, 2005

5. CONCLUSIONS AND DISCUSSION In this chapter we reviewed the field of joint learning research in biomedical domains. We presented two case studies on two representative joint learning tasks, protein function classification and regulatory network...

 

Chapter 21 - JOINT LEARNING USING MULTIPLE TYPES OF DATA AND KNOWLEDGE | Section: Keywords

Medical Informatics, 1st; Hsinchun Chen, Sherrilynne Fuller, Carol Friedman, William Hersh, Springer Nature, 2005

Keywords data mining machine learning joint learning data and knowledge algorithm • ir" />View table r2SectionId: ch0021s0516 r2SectionTitle: Keywords r2ChapterTitle: JOINT...




Chapter 20 - Health Information and Telehealth Technologies | Section: Information Privacy

Health Care Management and the Law, 2nd; Donna Hammaker, Thomas Knadig, Sarah Tomlinson, Jones & Bartlett Learning, 2018

Information Privacy Privacy is a significant issue for the HIT industry. An estimated 150 different individuals (from physicians and nurses to technicians and billing clerks) have access to at least part of a patient’s health records during a...

 

Chapter 22 - Data Mining as a Research Tool | Section: Summary

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Summary Big data is everywhere—we collect and store data every second of every day. The data in big clinical datasets can get lost, however, diminishing its value. Therefore, in health care, it is imperative that we use KDD to analyze these...

 

Chapter 18 - Data Management and Analytics: The Foundations for Improvement

Nursing Informatics for the Advanced Practice Nurse, 1st; Susan McBride, PhD, RN-BC, CPHIMS, FAAN, Mari Tietze, PhD, RN-BC, FHIMSS, Springer Publishing Company, 2016

Data Management and Analytics: The Foundations for Improvement Susan McBride and Mari Tietze OBJECTIVES • Discuss the basics of database management and related items that health care organizations need to consider....

 

Chapter 18 - Data Management and Analytics: The Foundations for Improvement | Section: ANALYTICS AND BI TOOLS

Nursing Informatics for the Advanced Practice Nurse, 1st; Susan McBride, PhD, RN-BC, CPHIMS, FAAN, Mari Tietze, PhD, RN-BC, FHIMSS, Springer Publishing Company, 2016

ANALYTICS AND BI TOOLS There are various tools that can be applied to health care data to make sense of patterns and trends within the data set. These types of analyses are typically categorized under a BI set of applications and software products....

 

Chapter 6 - Data Management | Section: Data Management

Health Information Management Technology: An Applied Approach, 5th; Nanette Sayles, EdD, RHIA, CCS, CHDA, CHPS, CPHIMS, FAHIMA, Leslie Gordon, MS, RHIA, FAHIMA, American Health Information Management Association, 2016

Data Management Managing the data that healthcare organizations create and produce is challenging. Data can exist in an information system, on a file on an employee’s computer or file server, in an e-mail, and in...

 

Chapter 26 - “Big Data” and Advanced Analytics | Section: FIVE KEY BIG DATA USE CASE CATEGORIES

Nursing Informatics for the Advanced Practice Nurse, 1st; Susan McBride, PhD, RN-BC, CPHIMS, FAAN, Mari Tietze, PhD, RN-BC, FHIMSS, Springer Publishing Company, 2016

FIVE KEY BIG DATA USE CASE CATEGORIES There are five use cases typically seen in other industries related to the use of big data , all of which are applicable to the health care industry. These use cases include (a) data explorations and mining...

 

Chapter 12 - Electronic Security | Section: Threats to Security

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Threats to Security The largest benefit of a computer network is the ability to share information. However, organizations need to protect that information and ensure that only authorized individuals have access to the network and the data...

 

Chapter 4 - Introduction to Cognitive Science and Cognitive Informatics | Section: Cognitive Science

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Cognitive Science The interdisciplinary field of cognitive science studies the mind , intelligence , and behavior from an information-processing perspective. H. Christopher Longuet-Higgins originated the term “ cognitive science ” in his 1973...

 

Chapter 4 - Introduction to Cognitive Science and Cognitive Informatics | Section: Introduction

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Introduction Cognitive science is the fourth of four basic building blocks used to understand informatics ( Figure 4-1 ). The Building Blocks of Nursing Informaticssection began by examining nursing science,...

 

Chapter 12 - Electronic Security

Nursing Informatics and the Foundation of Knowledge, 4th; Dee McGonigle, PhD, RN, CNE, FAAN, ANEF, Kathleen Mastrian, PhD, RN, Jones & Bartlett Learning, 2018

Electronic Security Lisa Reeves Bertin, Kathleen Mastrian and Dee McGonigle Objectives • Assess processes for securing electronic information in a computer network . • Identify various methods of user authentication and relate authentication to...



*

Regional Business News

167,916 Results




CONTENT SAMPLE

  • Agero Transforms the Roadside Experience with Machine Learning Data Intelligence


    News

    By: Agero. Business Wire (English). 09/21/2017.



  • 2.




    Machine
     Learning Market by Vertical, Deployment Mode, Service, Organization Size, and Region - Global Forecast to 2022 - Research and Markets


    News

    By: Research and Markets. Business Wire (English). 09/21/2017.



  • 3.




    Square Names Naveen Rao, Leader in Artificial Intelligence, to Board of Directors


    News

    By: Square, Inc.. Business Wire (English). 09/21/2017.




  • 4.




    Industry Survey Reveals Clinical Data Management Delays Are Slowing Trial Completion


    News

    By: Veeva Systems Inc.. Business Wire (English). 09/21/2017.






  • 5.





    Forensic
     Technology Market Analysis By Type, By Services, By Application, By Location And Segment Forecasts, 2014 - 2025


    News

    Forensic-Technology By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: New York








  • 6.





    Machine
     Learning Market by Vertical, Deployment Mode, Service, Organization Size And Region - Global Forecast to 2022


    News

    Machine-Learning-Mrkt By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: New York




  • 7.



    Apttus Unveils the First Intelligent Enterprise Contract Management Platform Powered by Artificial Intelligence (AI)


    News

    Apttus-AI-platform By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: California






  • 8.




    Healthcare Machine Learning Startup Cogitativo Closes $5M Series A Financing

    News

    COGITATIVO-Financing By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: California





  • 9.




    Sawt Deploys Machine Learning Technology to Power New Intelligence Platform for Online Video Search


    News

    CO-Simian By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: Colorado





  • 10.




    Koniag Information Security Services LLC awarded Contract to provide Program Management, Engineering & Technology Acquisition Support for DISA


    News

    KoniagInformationSec By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: Virginia





  • 11.




    Consumers Believe Artificial Intelligence Will Enhance Quality of Life but Simple Use Cases Still Required to Build Trust, Finds Strategy Analy

    News

    Strategy-Analytics By: PR Newswire. PR Newswire US. 09/21/2017.

    Subjects: Massachusetts





  • 12.




    Network
     Security Solutions Company Selects Five9 to Fully Integrate Global Customer Service Capabilities

    Full Text Available

    News

    By: Five9, Inc.. Business Wire (English). 09/20/2017.



  • 13.




    Grant Thornton grows Forensic Technology Services practice


    News

    By: Grant Thornton LLP. Business Wire (English). 09/20/2017.



  • 14.




    Immuta Personalizes Data Access to Accelerate the Creation, Deployment and Control of Machine Learning and AI

    News

    By: Immuta. Business Wire (English). 09/20/2017.



  • 15.




    Network
     Security Firewall Market by SMS Firewall, Signalling Firewall, Service, Deployment Type and Region - Global Forecast to 2022 - Research and Markets


    News

    By: Research and Markets. Business Wire (English). 09/20/2017.





  • 16.




    State Street Combines Quantitative Power of Machine Learning with Human Expertise to Launch Quantextual Idea Lab℠


    News

    By: State Street Corporation. Business Wire (English). 09/20/2017.



  • 17.




    Is This IPO An Early Investing Hot Spot For AI, Machine Learning?

    News

    By: GALGANI, MATTHEW. Investors Business Daily. 9/20/2017, p63-63. 1p. Reading Level (Lexile): 1510.




  • 18.




    Dynamo PR Launches Dedicated AI Division with Machine Learning Companies Speechmatics and Stratagem as Founding Clients


    News

    bc-Dynamo-PR-AI-Team By: PR Newswire. PR Newswire US. 09/20/2017.

    Subjects: United States of America; United Kingdom





  • 19.




    Roivant Sciences Launches Datavant to Improve Clinical Trials with Artificial Intelligence


    News

    ROIVANT-tech-launch By: PR Newswire. PR Newswire US. 09/20/2017.

    Subjects: California; Switzerland





  • 20.




    Quantum-Veritone Artificial Intelligence Solution Wins IBC2017 NewBay Best of Show Award


    News

    QUANTUM-Veritone-AI By: PR Newswire. PR Newswire US. 09/20/2017.

    Subjects: California





  • 21.




    Value of Machine Learning Market 44.1% CAGR to 2022 Led by Managed Services Segment


    News

    ReportsnReports By: PR Newswire. PR Newswire US. 09/20/2017.

    Subjects: India





  • 22.




    Artificial
     Intelligence Company Unveils New Name – Faros Becomes Raiven Healthcare


    News

    By: Raiven Healthcare. Business Wire (English). 09/19/2017.



  • 23.




    Global Artificial Intelligence Market Research Report (2017-2023): Forecast to Reach $36 Billion by 2025 - Research and Markets


    News

    By: Research and Markets. Business Wire (English). 09/19/2017.




  • 24.




    Siris Medical Inc. Raises $4 Million to Improve Cancer Radiation Treatment With Artificial Intelligence


    News

    By: Siris Medical Inc.. Business Wire (English). 09/19/2017.



  • 25.




    Artificial
     Intelligence Use Cases Are Numerous and Diverse, Yet Several Common Themes Underlie Commercial Implementations, According to Tractica


    News

    By: Tractica. Business Wire (English). 09/19/2017.


  • 26.



    Unity Technologies Unveils Machine Learning Agents; Turns Unity Creation Engine Into Artificial Intelligence Powerhouse


    News

    By: Unity Technologies. Business Wire (English). 09/19/2017.



  • 27.




    Veritas Advances 360 Data Management Portfolio to Conquer Complexities in a Multi-Cloud World


    News

    Veritas-Portfolio By: Canada Newswire. Canada Newswire. 09/19/2017.

    Subjects: Nevada





  • 28.




    Veritas Delivers Full Spectrum of 360 Data Management Capabilities on Microsoft Azure


    News

    VERITAS-360DataMgmt By: Canada Newswire. Canada Newswire. 09/19/2017.

    Subjects: Nevada





  • 29.




    Machine
     Learning Makes SAP S/4HANA® Even More Intelligent


    News

    SAPSE-S/4HANA-More By: PR Newswire. PR Newswire US. 09/19/2017.

    Subjects: Germany





  • 30.




    Veritas Advances 360 Data Management Portfolio to Conquer Complexities in a Multi-Cloud World


    News

    Veritas-Portfolio By: PR Newswire. PR Newswire US. 09/19/2017.

    Subjects: Nevada



*

Regulatory Insight 
13,024 Results


CONTENT SAMPLE

Regulatory History of P.L. 106-215 Immigration and Naturalization Service Data Management Improvement Act of 2000
  Regulatory History - Public Law
PL Enactment Date: June 15, 2000

Regulatory History of P.L. 93-502 [Freedom of Information Act Amendments]
  Regulatory History - Public Law
PL Enactment Date: November 21, 1974

Regulatory History of P.L. 89-306 [Automatic Data Processing Equipment for Federal Departments and Agencies]
  Regulatory History - Public Law
PL Enactment Date: October 30, 1965
  •  
Regulatory History of P.L. 111-340 Museum and Library Services Act of 2010
  Regulatory History - Public Law
PL Enactment Date: December 22, 2010


Regulatory History of P.L. 113-283 Federal Information Security Modernization Act of 2014
  Regulatory History - Public Law
PL Enactment Date: December 18, 2014


Regulatory History of P.L. 107-347 E-Government Act of 2002
  Regulatory History - Public Law
PL Enactment Date: December 17, 2002

Select search result item
Regulatory History of P.L. 94-409 Government in the Sunshine Act
  Regulatory History - Public Law
PL Enactment Date: September 13, 1976


Regulatory History of P.L. 110-53 Implementing Recommendations of the 9/11 Commission Act
  Regulatory History - Public Law
PL Enactment Date: August 03, 2007


Regulatory History of P.L. 106-102 Gramm-Leach-Bliley Act
  Regulatory History - Public Law
PL Enactment Date: November 12, 1999

Regulatory History of P.L. 106-65 National Defense Authorization Act for FY2000
  Regulatory History - Public Law
PL Enactment Date: October 05, 1999


Regulatory History of P.L. 98-139 Departments of Labor, Health and Human Services, and Education, and Related Agencies Appropriation Act, 1984
  Regulatory History - Public Law
PL Enactment Date: October 31, 1983


Regulatory History of P.L. 95-480 Departments of Labor and Health, Education, and Welfare Appropriations Act, 1979
  Regulatory History - Public Law
PL Enactment Date: October 18, 1978
  •  

Regulatory History of P.L. 108-81 Museum and Library Services Act of 2003
  Regulatory History - Public Law
PL Enactment Date: September 25, 2003
  •  
Regulatory History of P.L. 111-5 American Recovery and Reinvestment Act of 2009
  Regulatory History - Public Law
PL Enactment Date: February 17, 2009
  •  

Regulatory History of P.L. 106-387 Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act, 2001
  Regulatory History - Public Law
PL Enactment Date: October 28, 2000

Regulatory History of P.L. 106-398 Floyd D. Spence National Defense Authorization Act for FY2001
  Regulatory History - Public Law
PL Enactment Date: October 30, 2000


Regulatory History of P.L. 105-261 Strom Thurmond National Defense Authorization Act for FY99
  Regulatory History - Public Law
PL Enactment Date: October 17, 1998


Regulatory History of P.L. 105-277 Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1999
  Regulatory History - Public Law
PL Enactment Date: October 21, 1998
  •  

Regulatory History of P.L. 109-461 Veterans Benefits, Health Care, and Information Technology Act of 2006
  Regulatory History - Public Law
PL Enactment Date: December 22, 2006
  •  




  • Regulatory History of P.L. 110-389 Veterans' Benefits Improvement Act of 2008
      
    Regulatory History - Public Law
    PL Enactment Date: October 10, 2008


*

Religion and Philosophy Collection 

Results: 1,465



CONTENT SAMPLE

  • FORENSIC TAKE ON DEVIANCE: Microhistories, examining a range of notorious and mundane crimes, can help recover marginalised fi gures and forge links to wider cultural histories.


    Review

    By: Wildman, Charlotte. History Today. Sep2017, Vol. 67 Issue 9, p94-95. 2p.

    Subjects: LAW, Crime & Deviance Since 1700: Micro-Studies in the History of Crime (Book); KILDAY, Anne-Marie; NASH, David, 1942-; HISTORY of crime; NONFICTION





  • 2.




    The Seer of AI: Physicist MAX TEGMARK has borne witness to the rise of artificial intelligence and insists that we start thinking about what it means for humanity--before machines decide for us.


    Periodical

    By: DREVITCH, GARY. Psychology Today. Sep/Oct2017, Vol. 50 Issue 5, p27-28. 2p.

    Subjects: ARTIFICIAL intelligence; COLLEGE teachers; PHYSICS; REINFORCEMENT (Psychology); TECHNOLOGY





  • 3.




    Forensics
     of Capital.

    Review

    By: Cislaghi, Ben. Africa (Edinburgh University Press). Aug2017, Vol. 87 Issue 3, p643-644. 2p. DOI: 10.1017/S0001972017000225.


  • CSI: CHINA: The 19th and 20th centuries saw a revolution in Chinese forensic science, when traditional techniques were replaced by new methods from the West. Today, the world confronts another moment of transformation in forensic science.


    Periodical

    By: Asen, Daniel. History Today. Jul2017, Vol. 67 Issue 7, p54-65. 12p.

    Subjects: FORENSIC sciences -- History; CRIMINAL investigation; MURDER investigation; INDIVIDUAL evidence (Law); CHINESE history





  • 5.




    Why Artificial Intelligence is Not an Existential Threat.


    Periodical

    By: SHERMER, MICHAEL. Skeptic. 2017, Vol. 22 Issue 2, p29-35. 7p.

    Subjects: ARTIFICIAL intelligence; INTELLECT; NEURAL computers; SOLAR system; ELECTRONIC data processing





  • 6.




    Artificial
     Intelligence Simulation, Not Synthesis.


    Periodical

    By: KASSAN, PETER. Skeptic. 2017, Vol. 22 Issue 2, p36-41. 6p.

    Subjects: ARTIFICIAL intelligence; NEURAL computers; INTELLECT; BRAIN; HEURISTIC






  • 7.




    Anatomy of an Enduring Gender Gap: The Evolution of Women’s Participation in Computer Science.


    Academic Journal

    By: Sax, Linda J.; Lehman, Kathleen J.; Jacobs, Jerry A.; Kanny, M. Allison; Lim, Gloria; Monje-Paulson, Laura; Zimmerman, Hilary B. Journal of Higher Education. 2017, Vol. 88 Issue 2, p258-293. 36p. DOI: 10.1080/00221546.2016.1257306.

    Subjects: COMPUTER science students; SEX discrimination in education; COLLEGE students; UNDERGRADUATES; EDUCATIONAL surveys





  • 8.




    Forensic
     Medicine and Death Investigation in Medieval England.

    Review

    By: WALLIS, FAITH. American Historical Review. Oct2016, Vol. 121 Issue 4, p1353-1354. 2p.

    Subjects: FORENSIC Medicine & Death Investigation in Medieval England (Book); BUTLER, Sara M.; MEDICAL jurisprudence -- Great Britain; MEDIEVAL law; NONFICTION








  • 9.





    Forensic
     Dentistry: A Public and Social Service.


    Academic Journal

    By: Saunders, Michèle J. Generations. Fall2016, Vol. 40 Issue 3, p49-51. 3p.

    Subjects: DENTAL jurisprudence -- History; FORENSIC anthropology





  • 10.




    Computer
     Science, Meet Humanities: in New Majors, Opposites Attract.


    News

    By: RUFF, CORINNE. Chronicle of Higher Education. 2/5/2016, Vol. 62 Issue 21, pA19-A19. 2/3p.

    Subjects: EDUCATIONAL programs; STANFORD University; COLLEGE students; CUNY, Janice; KUROSE, Jim






  • 11.




    Corpses, popular culture and forensic science: public obsession with death.


    Academic Journal

    By: Penfold-Mounce, Ruth. Mortality. Feb2016, Vol. 21 Issue 1, p19-35. 17p. DOI: 10.1080/13576275.2015.1026887.

    Subjects: CULTURE; DEAD; FORENSIC sciences; PUBLIC opinion; SELF-perception; TELEVISION; ATTITUDES toward death







  • 12.





    Spatial Thinking in Geographic Information Science: Students,Geospatial Conceptions, Map-Based Reasoning, and Spatial Visualization Ability.


    Academic Journal

    By: Toru Ishikawa. Annals of the American Association of Geographers. Jan2016, Vol. 106 Issue 1, p76-95. 20p. 5 Diagrams, 12 Charts.

    Subjects: INFORMATION science; MODEL-based reasoning; GEOGRAPHY education; MAP reading; GEOSPATIAL data; GEOGRAPHIC information systems; THEMATIC maps; DATA modeling






  • 13.




    When Logic Meets Engineering: Introduction to Logical Issues in the History and Philosophy of Computer Science.


    Academic Journal

    By: De Mol, Liesbeth; Primiero, Giuseppe. History & Philosophy of Logic. Aug2015, Vol. 36 Issue 3, p195-204. 10p. DOI: 10.1080/01445340.2015.1084183.

    Subjects: SOFTWARE architecture; HISTORY of computers -- 20th century; DENOTATIONAL semantics





  • 14.




    Towards a Historical Notion of ‘Turing—the Father of Computer Science’.

    Academic Journal

    By: Daylight, Edgar G. History & Philosophy of Logic. Aug2015, Vol. 36 Issue 3, p205-228. 24p. DOI: 10.1080/01445340.2015.1082050.

    Subjects: TURING, Alan Mathison, 1912-1954; COMPUTER science -- History; VON Neumann, John, 1903-1957; ASSOCIATION for Computing Machinery; SCHOLARS





  • 15.




    Maria Klawe Won't Let Computer Science Remain a Boys' Club.


    News

    By: VOOSEN, PAUL. Chronicle of Higher Education. 4/24/2015, Vol. 61 Issue 32, Following pB12-B12. 1p. 1 Color Photograph.

    Subjects: KLAWE, Maria M.; WOMEN in computer science; HARVEY Mudd College; WOMEN computer scientists; GENDER differences (Sociology); PROBLEM solving -- Study & teaching





  • 16.




    The Future of Artificial Intelligence: Benevolent or Malevolent?


    Review

    By: MICHAEL, GEORGE. Skeptic. 2015, Vol. 20 Issue 1, p57-60. 4p.

    Subjects: FUTURE of the Mind: The Scientific Quest to Understand, Enhance & Empower the Mind, The (Book); OUR Final Invention: Artificial Intelligence & the End of the Human Era (Book); KAKU, Michio; BARRAT, James; NONFICTION





  • 17.




    Argument for Artificial Intelligence.


    Periodical

    By: Brummett, Randy. Humanist. Jan/Feb2015, Vol. 75 Issue 1, p5-5. 1/4p.

    Subjects: ARTIFICIAL intelligence; BORECKY, Chris





  • 18.




    Archaeology, forensics and the death of a child in Late Neolithic

    Academic Journal

    By: Carlie, Anne; Arcini, Caroline; Druid, Henrik; Risberg, Jan. Antiquity. Dec2014, Vol. 88 Issue 342, p1148-1163. 16p.

    Subjects: EXCAVATIONS (Archaeology) -- Sweden; HUMAN remains (Archaeology); WELLS; NEOLITHIC period -- Sweden; HUMAN sacrifice -- History; BOG bodies; DROWNING; FORENSIC archaeology; DIATOMS






  • 19.




    Theories, Practices and Examples for Community and Social 

    Review

    Chronicle of Higher Education. 6/20/2014 Supplement Monash, Vol. 60, p35-35. 1/4p.

    Subjects: THEORIES, Practices & Examples for Community & Social Informatics (Book); DENISON, Tom; SARRICA, Mauro; STILLMAN, Larry; INFORMATION & communication technologies; NONFICTION






  • 20.




    Forensic
     Retributive Justification in Romans 3:21-26: Paul’s Doctrine of Justification in Dialogue with Hebrews. (English)

    Academic Journal

    By: M. C. Teologia. dec2013, Vol. 38 Issue 4, p622-622. 1/5p. Language: Italian.





  • 21.





    Forensic
     Retributive Justification in Romans 3:21-26: Paul’s Doctrine of Justification in Dialogue with Hebrews. (English)

    Academic Journal

    By: R. V. Teologia. dec2013, Vol. 38 Issue 4, p623-623. 1/6p. Language: Italian.




  • 22.




    Let's Help Computer-Science Students Crack the Code.


    News

    By: HENDLER, JIM. Chronicle of Higher Education. 3/8/2013, Vol. 59 Issue 26, pA34-A34. 1/2p.

    Subjects: COMPUTER science education (Higher); COLLABORATIVE learningCOMPUTER science students






  • 23.




    A Reboot in Recruiting Women Into Computer Science.

    News

    By: GOSE, BEN. Chronicle of Higher Education. 11/2/2012, Vol. 59 Issue 10, pB7-B8. 2p.

    Subjects: WOMEN in computer science; COLLEGE student recruitment; COMPUTER science education; WOMEN college students; GENDER stereotypes; WOMEN computer programmers; WOMEN computer scientists; NATIONAL ScienceFoundation (U.S.)





  • 24.




    'Introduction to Computer Science,' Udacity.


    News

    By: Evans, David. Chronicle of Higher Education. 10/5/2012, Vol. 59 Issue 6, pB11-B11. 1/2p.

    Subjects: ONLINE courses; COMPUTER science education (Higher)




  • 25.




    Keith Laybourn and David Taylor. Policing in England and Wales, 1918–39: The Fed, Flying Squads, and Forensics.


    Review

    By: Bailey, Victor. American Historical Review. Oct2012, Vol. 117 Issue 4, p1300-1301. 2p.

    Subjects: POLICING in England & Wales 1918-1939: The Fed, Flying Squads & Forensics (Book); LAYBOURN, Keith; TAYLOR, David; POLICE -- England; NONFICTION





  • 26.




    Statistician Works to Blend Computer Science With Journalism.


    News

    By: CHEN, ANGELA. Chronicle of Higher Education. 9/28/2012, Vol. 59 Issue 5, pA25-A25. 1/3p.

    Subjects: HANSEN, Mark; INTERDISCIPLINARY approach to knowledge; STATISTICIANS





  • 27.




    Artificial
     Intelligence: The Basics.


    Review

    By: Keet, C. Maria. International Studies in the Philosophy of Science. Sep2012, Vol. 26 Issue 3, p351-354. 4p. DOI: 10.1080/02698595.2012.731737.

    Subjects: ARTIFICIAL Intelligence: The Basics (Book); WARWICK, Kevin; ARTIFICIAL intelligence; NONFICTION





  • 28.




    Forensic
    -Retributive Justification in Romans 3:21-26: Paul's Doctrine of Justification in Dialogue with Hebrews.


    Academic Journal

    By: Ribbens, Benjamin J. Catholic Biblical Quarterly. Jul2012, Vol. 74 Issue 3, p548-567. 20p.

    Subjects: BIBLE. Romans; BIBLE. Hebrews; JUSTIFICATION (Christian theology); GOD (Christianity) -- Righteousness; PAUL, the Apostle, Saint; JUSTICE in the Bible; BIBLICAL Greek language -- Grammar




  • 29.

    Guidance for Experimental Research in Extra Sensory Perception Using the Theories of Probability, Electromagnetism, and Information Science.


    Academic Journal

    By: Howard, Robert G. Journal of Spirituality & Paranormal Studies. Jul2012, Vol. 35 Issue 3, p126-135. 10p.

    Subjects: PERCEPTION; PROBABILITY theory; ELECTROMAGNETISM; INFORMATION science; MATHEMATICS; BRAIN physiology





  • 30.




    Rebooting Recruiting to Get More Women in Computer Science.


    News

    By: Gose, Ben. Chronicle of Higher Education. 6/10/2012 Diversity Supplement, Vol. 58, p1-1. 1p.

    Subjects: WOMEN in computer scienceCOMPUTER science education (Higher); UNIVERSITIES & colleges -- United States; HIGHER education of women; WOMEN -- United States; BACHELOR of arts degree


*

RIBA British Architectural Library Catalogue
502 Results


*

RILM Abstracts of Music Literature

Results: 1,726



CONTENT SAMPLE


  • 1.

    Boulez, information science and IRCAM

    Periodical

    (Main Record) By: Maconie, Robin Medium: print; online. Source: Tempo: A quarterly review of modern music, 71(279) p38. ISSN: 0040-2982. Published in: United Kingdom. Publication Date: January, 2017. Language: English. Abstract available.

    Subjects: science -- information science -- influence on 20th-c. music; Stravinsky, Igor -- writings -- Memories and commentaries -- information science; Craft, Robert Lawson -- writings -- Memories and commentaries -- information science; Babbitt, Milton -- works -- relation to information science; Boulez, Pierre -- works -- relation to information science; Stockhausen, Karlheinz -- works -- relation to information science; Cage, John -- works -- relation to information science; twentieth-century music -- history and development -- influenced by information science; ;






  • 2.




    Forensic
     eye


    Periodical

    (Main Record) By: Duchen, Jessica Medium: print. Source: Opera news, 80(11) p40. ISSN: 0030-3607. Published in: United States. Publication Date: May, 2016. Language: English. Abstract available.

    Subjects: Mitchell, Katie -- life; directors, producers, etc. -- Mitchell, Katie; ;





  • 3.




    The development of Sonic Pi and its use in educational partnerships: Co-creating pedagogies for learning computer programming


    Periodical

    (Main Record) By: Aaron, Samuel; Blackwell, Alan F.; Burnard, Pamela Medium: print; online. Source: Journal of music, technology & education, 9(1) p75. ISSN: 1752-7066. Collected Work: Journal of music, technology & education. IX/1: Live coding in music education. Published in: United Kingdom. Publication Date: 2016. Language: English. Abstract available.

    Subjects: pedagogy--general -- computer programming -- elementary and secondary education -- live coding -- Sonic Pi; computer applications -- pedagogy -- elementary and secondary education -- live coding -- Sonic Pi; composition -- pedagogy -- elementary and secondary education -- live coding -- Sonic Pi; ;





  • 4.




    Afklaring af den terapeutiske relation mellem den retspsykiatriske patient og musikterapeut


    Periodical

    [Clarification of the therapeutic relationship between the forensic psychiatric patient and music therapist] (Main Record) By: Frederiksen, Britta Medium: online. Source: Musikterapi i psykiatrien online, 10(1) p5. Published in: Denmark. Publication Date: December, 2015. Language: Danish. Abstract available.

    Subjects: therapy -- psychiatric disorders -- forensics -- therapeutic relationship;





  • 5.




    Bringing 'Musicque into the tableture': Machine-learning models for polyphonic transcription of 16th-century lute tablature


    Periodical

    (Main Record) By: Valk, Reinier de; Weyde, Tillman Medium: print. Source: Early music, 43(4) p563. ISSN: 0306-1078. Published in: United Kingdom. Publication Date: November, 2015. Language: English. Abstract available.

    Subjects: editing -- tablature -- lute tablature -- use of computers; instruments--string (lute family) -- lute music -- lute tablature -- editing -- use of computers; computer applications -- notation -- lute tablature -- editing; ;






  • 6.




    Music making interventions with adults in the forensic setting: A systematic review of the literature. II: Case studies and good vibrations


    Periodical

    (Main Record) By: Coutinho, Biljana Vrancic; Hansen, Anita Lill; Waage, Leif; Hillecke, Thomas K.; Koenig, Julian Medium: online. Source: Music and medicine: An interdisciplinary journal, 7(4) p50. ISSN: 1943-8621. Published in: United States. Publication Date: October, 2015. Language: English. Abstract available.

    Subjects: therapy--music therapy -- active music therapy -- forensics;






  • 7.




    Music making interventions with adults in the forensic setting: A systematic review of the literature. I: Group interventions


    Periodical

    (Main Record) By: Coutinho, Biljana Vrancic; Hansen, Anita Lill; Waage, Leif; Hillecke, Thomas K.; Koenig, Julian Medium: online. Source: Music and medicine: An interdisciplinary journal, 7(3) p40. ISSN: 1943-8621. Published in: United States. Publication Date: July, 2015. Language: English. Abstract available.

    Subjects: therapy -- forensics -- group music therapy;






  • 8.




    Artificial
     intelligence in Organised sound


    Periodical

    (Main Record) By: Miranda, Eduardo Reck; Williams, Duncan Medium: print; online. Source: Organised sound: An international journal of music technology, 20(1) p76. ISSN: 1355-7718. Collected Work: Organised sound: An international journal of music technology. XX/1 (April 2015): Organised sound celebrates 20 years. Published in: United Kingdom. Publication Date: April, 2015. Language: English. Abstract available.

    Subjects: periodicals -- Organised sound: An international journal of music and technology -- artificial intelligence as subject -- history and development; computer applications -- artificial intelligence -- as subject of Organised sound: An international journal of music and technology -- history and development; ;





  • 9.




    Mathematics and computation in music


    Book

    (Main Record/Collected Work) By: Collins, Tom; Meredith, David; Volk, Anja; Bandtlow, Oscar; Chew, Elaine Conference Source: 5rd International Conference, MCM (2015: London). Series: Lecture Notes in Computer Science. Publisher: Springer. Item has Multiple Imprints. Published in: Netherlands. Publication Date: 2015. Language: English.




  • 10.




    Phd projekt: Udvikling af den terapeutiske relation i musikterapi med retspsykiatriske patienter


    Book

    [PhD project: Development of the therapeutic relationship in music therapy with forensic psychiatric patients] (Main Record) By: Frederiksen, Britta Medium: online. Source: Musikterapi i psykiatrien online, 9(2) p45. Collected Work: Musikterapiklinikken 20 års. Published in: Denmark. Publication Date: December, 2014. Language: Danish. Abstract available.

    Subjects: therapy -- schizophrenia -- forensics -- therapeutic relationship;






  • 11.




    The sense of ensemble: A machine learning approach to expressive performance modelling in string quartets


    Periodical

    (Main Record) By: Marchini, Marco; Ramírez Meléndez, Rafael; Papiotis, Panos; Maestre, Esteban Medium: print; online. Source: Journal of new music research, 43(3) p303. ISSN: 0929-8215. Collected Work: Journal of new music research. XLIII/3 (September 2014): Music and machine learning. Published in: United Kingdom. Publication Date: September, 2014. Language: English. Abstract available.

    Subjects: computer applications -- expressive performance modeling -- string quartets -- use of machine learning -- inter-voice contextual attributes; performance -- computer applications -- expressive performance modeling -- string quartets -- use of machine learning -- inter-voice contextual attributes; string quartet -- computer applications -- expressive performance modeling -- string quartets -- use of machine learning -- inter-voice contextual attributes;






  • 12.




    Journal of new music research. XLIII/3 (September 2014): Music and machine learning


    Book

    (Main Record/Collected Work) By: Conklin, Darrell; Ramírez Meléndez, Rafael; Iñesta, José M. Medium: print; online. Source: Journal of new music research, 43(3). ISSN: 0929-8215. Publisher: Routledge. Published in: United Kingdom. Publication Date: September, 2014. Language: English. Abstract available.

    Subjects: computer applications -- periodicals -- Journal of new music research, XLIII/3; ;






  • 13.




    Situated music cognition: Roboter, Künstliche Intelligenz und Kreativität

    Periodical

    [Situated music cognition: Robots, artificial intelligence, and creativity] (Main Record) By: Seifert, Uwe Medium: print. Source: Positionen: Texte zur aktuellen Musik, (99) p13. ISSN: 0941-4711. Collected Work: Positionen: Texte zur aktuellen Musik. 99 (May 2014): Generative Kunst. Published in: Germany. Publication Date: May, 2014. Language: German.




  • 14.




    Forensic
     music therapy: A treatment for men and women in secure hospital settings


    Review

    (Review) By: Dickinson, Stella Compton; Odell-Miller, Helen; Adlam, John; Welldon, Estela V. Reviewed by: Frederiksen, Britta. Medium: print; online. Source: Nordic journal of music therapy, 23(1) p90. ISSN: 0803-8131. Published in: United Kingdom. Publication Date: February, 2014. Language: English.

    Subjects: therapy -- forensics;






  • 15.




    Audio forensics


    Book

    (Main Record/Collected Work) By: Brookes, Mike; Begault, Durand René Medium: print; online. Conference Source: 54th AES International Conference on Audio Forensics (2014: London). Publisher: Audio Engineering Society. Published in: United States. Publication Date: 2014. Language: English.




  • 16.




    Forensic
     music therapy: A treatment for men and women in secure hospital settings


    Review

    (Review) By: Dickinson, Stella Compton; Odell-Miller, Helen; Adlam, John; Welldon, Estela V. Reviewed by: Sutton, Julie P.. Medium: print. Source: British journal of music therapy, 28(2) p44. ISSN: 0951-5038. Published in: United States. Publication Date: 2014. Language: English.

    Subjects: therapy -- forensics;






  • 17.




    Forensic
     music therapy: A treatment for men and women in secure hospital settings


    Review

    (Review) By: Dickinson, Stella Compton; Odell-Miller, Helen; Adlam, John; Welldon, Estela V. Reviewed by: Dammeyer, Charlotte. Medium: print; online. Source: Dansk musikterapi, 11(1) p37. ISSN: 1603-8800. Published in: Denmark. Publication Date: 2014. Language: Danish.

    Subjects: therapy -- forensics;






  • 18.




    Supporting students in music technology higher education to learn computer programming


    Periodical

    (Main Record) By: Moore, J. David Medium: print; online. Source: Journal of music, technology & education, 7(1) p75. ISSN: 1752-7066. Published in: United Kingdom. Publication Date: 2014. Language: English. Abstract available.

    Subjects: pedagogy--general -- music technology -- college and university -- programmingcomputer applications -- computer programming -- pedagogy -- college and university -- music technology students; ;






  • 19.




    Методика обучения информатике с использованием музыкально-компьютерных технологий на пропедевтическом этапе общего образования


    Dissertation/ Thesis

    [Methods of teaching computer science using music computer technology at the propaedeutic stage of general education] (Main Record) By: Plotnikov, Konstantin Ûr'evič (Плотников, Константин Юрьевич) Dissertation Source: Kand., from Rossijskij Gosudarstvennyj Pedagogičeskij Universitet im. A.I. Gercena, Sankt-Peterburg Published in: russian federation. Publication Date: 2014. Language: Russian.

    Subjects: pedagogy--by place -- Russia -- elementary education -- computer sciencescience -- computer science -- Russia -- pedagogy -- elementary education; Russian Federation -- pedagogy -- elementary education -- computer science; ;






  • 20.




    Evolutionary and biologically inspired music, sound, art and design

    Book

    (Main Record/Collected Work) By: Romero, Juan; McDermott, James; Correia, João Eduardo Conference Source: 3rd International Conference, EvoMUSART 2014 (2014: Granada). Series: Lecture notes in computer science, No. 8601. Publisher: Springer. Item has Multiple Imprints. Published in: Germany. Publication Date: 2014. Language: English.




  • 21.




    Sound, music, and motion


    Book

    (Main Record/Collected Work) By: Aramaki, Mitsuko; Derrien, Olivier; Kronland-Martinet, Richard; Ystad, Sølvi Conference Source: 10th International Symposium, CMMR (2013: Marseille). Series: Lecture notes in computer science, No. 8905. Publisher: Springer. Published in: Germany. Publication Date: 2014. Language: English. Abstract available.

    Subjects: congresses, conferences, symposia -- France -- Marseille -- electronic music and computer music -- 2013; electronic music and computer music -- multidisciplinary research -- conferences -- 2013; ; ;






  • 22.




    Participation: A combined perspective on the concept from the fields of informatics and music and health


    Book

    (Main Record) By: Stensæth, Karette; Holone, Harald; Herstad, Jo Collected Work: Music, health, technology and design. Published in: Norway. Publication Date: 2014. Language: English. Abstract available.

    Subjects: medicine--by topic -- health -- music and health -- concept of participation; computer applications -- informatics -- concept of participation; academic institutions -- Norway -- Oslo -- Norges Musikkhøgskole -- RHYME project -- 2010-15; ;






  • 23.




    Innanfor og utanfor: Rockens rolle innan kriminalomsorg og ettervern


    Dissertation/ Thesis

    [Inside and outside: The role of rock in forensics and rehabilitation] (Main Record) By: Tuastad, Lars Medium: print; online. Dissertation Source: PhD, from Universitetet i Bergen/University of Bergen Publisher: Universitetet i Bergen/University of Bergen. Published in: Norway. Publication Date: 2014. Language: Norwegian. Abstract available.

    Subjects: therapy -- forensics -- rock; rock -- therapy -- forensics;






  • 24.




    Artificial intelligence
    , ovvero suonare il corpo della macchina o farsi suonare? La costruzione dell’identità audiovisiva della Warp Records


    Periodical

    [Artificial intelligence, or, Playing the body of the machine or making it play? The construction of the audiovisual identity of Warp Records] (Main Record) By: Bratus, Alessandro Medium: online. Source: Philomusica on-line: Rivista del Dipartimento di Musicologia e Beni culturali, 13(2) p55. Collected Work: Philomusica on-line: Rivista del Dipartimento di Musicologia e Beni culturali. XIII/2 (2014): Just for dancing? Studi italiani sulle musiche elettroniche popular all’alba del terzo millennio. Published in: Italy. Publication Date: 2014. Language: Italian. Abstract available.

    Subjects: sound recordings--by label -- Warp Records -- history and development -- 1980s to present; electronica -- history and development -- role of Warp Records -- 1980s to present; film and video -- music videos -- Warp Records -- aesthetics -- 1980s to present; ;






  • 25.




    The new 'non-baking' cure for sticky shed tapes: How forensic chemistry saved the Annapolis sounds masters


    Periodical

    (Main Record) By: Richardson, Charles A. Medium: print; online. Source: ARSC journal, 44(2) p217. ISSN: 0004-5438. Published in: United States. Publication Date: Fall, 2013. Language: English. Abstract available.

    Subjects: producers and engineers--sound recordings -- Richardson, Charles A.; sound recordings--general -- magnetic tapes -- restoration -- Annapolis sounds; sound recordings--by place -- United States of America -- Maryland -- Annapolis -- Annapolis sounds -- 1976; conservation and restoration -- sound recordings -- magnetic tapes -- carbon black back-coating -- sticky-shed syndrome;





  • 26.




    Predicting an orchestral conductor's baton movements using machine learning


    Periodical

    (Main Record) By: Dansereau, Donald G.; Brock, Nathan; Cooperstock, Jeremy R. Medium: print; online. Source: Computer music journal, 37(2) p28. ISSN: 0148-9267. Collected Work: Computer music journal. XXXVII/2 (summer 2013): Timing and synchronization in performance. Published in: United States. Publication Date: Summer, 2013. Language: English. Abstract available.

    Subjects: conducting -- computer applications -- conductor's baton movement prediction -- use of machine learningcomputer applications -- conductor's baton movement prediction -- use of machine learning; performance practice--twentieth and twenty-first century -- telematic performance -- distributed orchestral performance -- latency -- conductor's baton movement prediction -- computer applications; orchestra -- telematic performance -- distributed orchestral performance -- latency -- conductor's baton movement prediction -- computer applications; ;


*

1,402 Results 


CONTENT SAMPLE

  • 1

    Development of masters modules in computer forensics and cybercrime for computer science and forensic science students

    Overill, Richard E. International Journal of Electronic Security and Digital Forensics2.2 (May 3, 2009): 132-140.

    Cited by (‎1)    



  • 2

    The information security digital divide between information security managers and users

    Albrechtsen, Eirik; Hovden, Jan. Computers & Security28.6 (Sep 2009): 476-490.

    Cited by (‎29)    



  • 3

    Information security policy - what do international information security standards say?

    Hoene, K; Eloff, JHP. Computers & Security21.5 (2002): 402-409.

  • 4

    Self-efficacy in information security: Its influence on end users' information security practice behavior

    Rhee, Hyeun-Suk; Kim, Cheongtag; Ryu, Young U. Computers & Security28.8 (Nov 2009): 816-826.

    Cited by (‎57)    


  • 5

    Risk analysis: Lessons from artificial intelligence.

    Diekmann, JE. International Journal of Project Management10.2 (1992): 75-80.

    Cited by (‎4)    



  • 6

    Artificial intelligence in process plant safety.

    Venkatasubramanian, V. Apr 1990: NTIS, SPRINGFIELD, VA (USA).

  • 7

    The representation of context: ideas from artificial intelligence

    Franklin, J. Law, Probability and Risk2.3 (Sep 2003): 191-199.

    Cited by (‎1)    



  • 8

    Risk assessment for pipelines with active defects based on artificial intelligence methods

    Anghel, Calin I. International Journal of Pressure Vessels and Piping86.7 (Jul 2009): 403-411.

    Cited by (‎1)    

     
  • 9

    Comparing mathematical, statistical and artificial intelligence based techniques in bankruptcy prediction

    Oestermark, R; Aaltonen, J. Accounting and Business Review5.1 (Jan 1998): 95-120.
     

  • 10

    Heat wave hazard classification and risk assessment using artificial intelligence fuzzy logic

    Keramitsoglou, Iphigenia; Kiranoudis, Chris T; Maiheu, Bino; Ridder, Koen; Daglis, Ioannis A; et al. Environmental Monitoring and Assessment
    (October 2013): 8239-8258.


  • 11

    Predicting the Outcome of Construction Litigation Using an Integrated Artificial Intelligence Model 

    Arditi, David; Pulket, Thaveeporn. Journal of Computing in Civil Engineering 1 (2010): 73-80.


  • 12

    An evaluation of UK risky money: an artificial intelligence approach

    Binner, Jane M; Gazely, Alicia M; Kendall, Graham. Global Business and Economics Review11.1 (May 20, 2009): 1-18.

  • 13

    The use of artificial intelligence to identify people at risk of oral cancer and precancer

    Speight, P M; Elliott, A E; Jullien, JA; Downer, M C; Zakzrewska, J M. British Dental Journal179.10 (1995): 382-387.

    Cited by (‎3)    


  • 14

    Risk assessment of sewer condition using artificial intelligence tools: application to the SANEST sewer system

    Sousa, V; Matos, J P; Almeida, N; Matos, J Saldanha. Water Science & Technology69.3 (0, 2014): 622-627.
     

  • 15 Artificial intelligence modeling to evaluate field performance of photocatalytic asphalt pavement for ambient air purification

    Asadi, Somayeh; Hassan, Marwa; Nadiri, Ataallah; Dylla, Heather. Environmental Science and Pollution Research International21.14 (20140700): 8847-8857.

    Cited by (‎1)    References (‎64)    

     


  • 16

    A Method for Risk Assessment to Deep-Seated Catastrophic Landslides caused by Heavy Rain based on Artificial Intelligence and Mathematical Statistics

    Oda, Kazuhiro; Ito, Shinichi; Koizumi, Keigo. Proceedings of the International Society of Offshore and Polar Engineers Conference (2014): 610-615.

    References (‎7)    



    • 17

      Resource management in cropping systems using artificial intelligence techniques: a case study of orange orchards in north of Iran

      Nabavi-Pelesaraei, Ashkan; Abdi, Reza; Rafiee, Shahin; Shamshirband, Shahaboddin; Yousefinejad-Ostadkelayeh, Majid. Stochastic Environmental Research and Risk Assessment30.1 (January 2016): 413-427.

    • 18

      Risk assessment of atmospheric emissions using machine learning

      Cervone, G; Franzese, P; Ezber, Y; Boybeyi, Z. Natural Hazards and Earth System Sciences8.5 (2008): 991-1000.


    • 19

      Computer Network Security in Windows

      Anonymous. Sigurnost48.2 (2006): 175-180.

    • 20

      Network Environment and Financial Risk Using Machine Learning and Sentiment Analysis

      Li, Nan; Liang, Xun; Li, Xinli; Wang, Chao; Wu, Desheng Dash. Human and Ecological Risk Assessment15.2 (Mar 2009).

      Cited by (‎4)    



    • 21

      Mortality Risk Score Prediction in an Elderly Population Using Machine Learning

      Rose, Sherri. American Journal of Epidemiology177.5 (Mar 1, 2013): 443-452.

    • 22

      Machine learning models for predicting PAHs bioavailability in compost amended soils

      Wu, Guozhong; Kechavarzi, Cedric; Li, Xingang; Wu, Shaomin; Pollard, Simon; et al. Chemical Engineering Journal223 (May 1, 2013): 747-754.


       
    • 23

      Data-driven topo-climatic mapping with machine learning methods

      Pozdnoukhov, A; Foresti, L; Kanevski, M. Natural Hazards50.3 (Sep 2009): 497-518.

      Cited by (‎3)    

       

    • 24

      Application of machine learning for soil survey updates: A case study in southeastern Ohio.

      Subburayalu, Sakthi Kumaran. Dissertation Abstracts International. Vol. 69, no. 01, suppl. B, 135 p. 2008, 135. 2008.

      References (‎64)    



    • 25

      Outside the machine learning blackbox: Supporting analysts before and after the learning algorithm.

      Munson, Miles Arthur. Dissertation Abstracts International. Vol. 71, no. 08, suppl. B, 199 p. 2010, 199. 2010.

      References (‎207)    


    • 26

      Managing Information Security.

      Wong, K; Watt, S. ELSEVIER ADVANCED TECHNOLOGY, 256 BANBURY ROAD, OXFORD OX2 7DH (UK). 1991, ELSEVIER ADVANCED TECHNOLOGY, 256 BANBURY ROAD, OXFORD OX2 7DH (UK), 1991.
       

    • 27

      Computer Network Security for the Radiology Enterprise

      Eng, J. Radiology220.2 (Aug 2001): 303-309.


    • 28

      Network security mechanisms utilising network address translation

      Michalski, John T. International Journal of Critical Infrastructures2.1: 10-49.


    • 29

      Information security risk assessment survey

      Zhang, Li; Peng, Jianfen; Du, Yuge; Wang, Qing. Journal of Tsinghua University Science and Technology52.10 (Oct 2012): 1364-1369.

      Cited by (‎3)    References (‎26)    

      • Abstract/Details
       

    • 30

      Information security: The moving target

      Dlamini, M T; Eloff, JHP; Eloff, M M. Computers & Security28.3-4 (Jun 2009): 189-198.

      Cited by (‎32)    


    • 31

      Proportional Hazards in Information Security

      Ryan, Julie JCH; Ryan, Daniel J. Risk Analysis25.1 (Feb 2005): 141-149.

      Cited by (‎3)    



    • 32

      Bridging Gender Gaps, Networking in Computer Science

      Cozza, Michela. Gender, Technology and Development15.2 (Jul 2011): 319-337.

      Cited by (‎1)    References (‎63)    


    • 33

      Job stress evaluation using response surface data mining

      Lee, Yonghee; Shin, Sangmun. International Journal of Industrial Ergonomics40.4 (Jul 2010): 379-385.

    • 34

      Predicting the hazardous dose of industrial chemicals in warm-blooded species using machine learning-based modelling approaches

      Gupta, S; Basant, N; Singh, K P. SAR and QSAR in Environmental Research26.6 (January 1, 2015): 479-498.

      Cited by (‎1)    



    • 35

      Uncertainty quantification and integration of machine learning techniques for predicting acid rock drainage chemistry: A probability bounds approach

      Betrie, Getnet D; Sadiq, Rehan; Morin, Kevin A; Tesfamariam, Solomon. Science of the Total Environment490 (August 2014): 182-190.


    • 36

      Remediating radium contaminated legacy sites: Advances made through machine learning in routine monitoring of "hot" particles

      Varley, Adam; Tyler, Andrew; Smith, Leslie; Dale, Paul; Davies, Mike. Science of the Total Environment521 (July 2015): 270-279.

      Cited by (‎2)    


       

    • 37

      Classification of Listeria monocytogenes Persistence in Retail Delicatessen Environments Using Expert Elicitation and Machine Learning

      Vangay, P; Steingrimsson, J; Wiedmann, M; Stasiewicz, MJ. Risk Analysis34.10 (October 2014): 1830-1845.

      Cited by (‎1)    References (‎45)    



    • 38

      Implementation and effectiveness of organizational information security measures

      Hagen, Janne Merete; Albrechtsen, Eirik; Hovden, Jan. Information Management & Computer Security16.4 (2008): 377-397.


    • 39

      Ontologies for information security management and governance

      Moreira, Edson Santos; Martimiano, Luciana Fondazzi; BrandAo, Antonio Santos; Bernardes, Mauro CEsar. Information Management & Computer Security16.2 (2008): 150-165.

      Cited by (‎7)    



    • 40

      Theory and methods of information security risk assessment

      Min, Jinghua; Zhang, Jianjun. Journal of Tsinghua University Science and Technology50.Suppl. 1 (Oct 2010): 1554-1559.

      References (‎3)    



    • 41

      Challenges and complexities of managing information security

      Onwubiko, Cyril; Lenaghan, Andrew P. International Journal of Electronic Security and Digital Forensics2.3 (Jul 28, 2009): 306-321.


    • 42

      Brain Cancer Risk Prediction Tool using Data Mining

      Jesmin, Tasnuba; Ahmed, Kawsar; Rahman, Md Zamilur; Alam Miah, Md Badrul. International Journal of Computer Applications61.12 (2013).

      Cited by (‎2)    References (‎12)    

       

    • 43

      A cyclical evaluation model of information security maturity

      Alencar Rigon, Evandro; Merkle Westphall, Carla; Ricardo dos Santos, Daniel; Becker Westphall, Carlos. Information Management & Computer Security22.3 (2014): 265-278.

      Cited by (‎1)    References (‎16)    



    • 44

      Assessment of business process information security

      Johnson, Pontus; Johansson, Erik. International Journal of Business Process Integration and Management3.2 (Oct 29, 2008): 118-130.

      Cited by (‎1)    

       

    • 45

      A meta-process for information security risk management

      Papadaki, Katerina; Polemi, Despina. International Journal of Electronic Security and Digital Forensics1.4 (Nov 27, 2008): 336-343.


    • 46

      A risk assessment model for information security

      Wei, June; Liu, Lai C; Koong, Kai S; Li, Yi. International Journal of Business and Systems Research (IBSR)5.2 (2011): 158-171.

    • 47

      Information Security: IRS Electronic Filing Systems

      General Accounting Off., Washington, DC (USA). 2001: GAO, WASHINGTON, DC (USA).

    • 48

      On Computer Network Security Risks and Emergency Response Technology

      Song, Meng Hua. Applied Mechanics and Materials484-485.Green Power, Materials and Manufacturing Technology and Applications III (Jan 2014): 833-836.

    • 49

      Research on Importance of Computer Network Security Management Technology for Coal Mining Enterprises

      DAI, Wei-wei. Meitan Jishu / Coal Technology32.10 (2013): 82-83.

    • 50

      A Comprehensive Network Security Risk Model for Process Control Networks

      Henry, Matthew H; Haimes, Yacov Y. Risk Analysis29.2 (Feb 2009): 223-248.


    • 51

      Multivariate Bayesian Regression Applied to the Problem of Network Security

      Triantafyllopoulos, K; Pikoulas, J. Journal of Forecasting21.8 (Dec 

    *


    *


    David Dillard


    NET-GOLD

    http://groups.yahoo.com/group/net-gold


    https://groups.io/org/groupsio/net-gold/archives

    http://net-gold.3172864.n2.nabble.com/

     

    Research Guides

    https://sites.google.com/site/researchguidesonsites/

     

     

    Research Paper Writing

    https://sites.google.com/site/howtowriteasuperresearchpaper/
    Employment

    https://sites.google.com/site/employmentsources/

    Internships

    https://sites.google.com/site/internshipsarticles/

    Hospitality

    https://sites.google.com/site/hospitalitydatabasesandtools/

    Disabilities And Employment

    https://sites.google.com/site/disabilitynetsources/Home/employment-and-disabilities

    Indoor Gardening

    https://groups.yahoo.com/neo/groups/indoorgardeningurban/info

    Educator-Gold

    http://groups.yahoo.com/group/educator-gold/

    K12ADMINLIFE

    http://groups.yahoo.com/group/k12adminlife/

     

    Blog

    https://educatorgold.wordpress.com/

     

    Research Guide:

    Information Literacy

    http://tinyurl.com/78a4shn

     

    Twitter: davidpdillard

     

    Bushell, R. & Sheldon, P. (Eds),

    Wellness and Tourism: Mind, Body, Spirit,

    Place, New York: Cognizant Communication Books.

    Wellness Tourism: Bibliographic and Webliographic Essay

    David P. Dillard

    http://tinyurl.com/p63whl

     

    Railtram Discussion Group

    from the union pacific to britrail and beyond

    https://groups.yahoo.com/neo/groups/railtram/info

     

    Indoor Gardening

    improve your chances for indoor gardening success

    http://tech.groups.yahoo.com/group/indoorgardeningurban/

     

    Sport-Med

    https://www.jiscmail.ac.uk/lists/sport-med.html

    http://groups.yahoo.com/group/sports-med/


     

    Health Diet Fitness Recreation Sports Tourism

    https://groups.yahoo.com/neo/groups/healthrecsport/info


     

     

     

     

     

     

    .

     

    .

     

    Please Ignore All Links to JIGLU

    in search results for Net-Gold and related lists.

    The Net-Gold relationship with JIGLU has

    been terminated by JIGLU and these are dead links.

    http://groups.yahoo.com/group/Net-Gold/message/30664

    http://health.groups.yahoo.com/group/healthrecsport/message/145


     

    .

     

    .

     



    Comments