Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationLocation
Done
Filters
Reset
811
result(s) for
"Computer systems History Congresses."
Sort by:
Exploring the early digital
Changes in the present challenge us to reinterpret the past, but historians have not yet come to grips with the convergence of computing, media, and communications technology. Today these things are inextricably intertwined, in technologies such as the smartphone and internet, in convergent industries, and in social practices. Yet they remain three distinct historical subfields, tilled by different groups of scholars using different tools. We often call this conglomeration \"the digital,\" recognizing its deep connection to the technology of digital computing. Unfortunately, interdisciplinary studies of digital practices, digital methods, or digital humanities have rarely been informed by deep engagement with the history of computing. Contributors to this volume have come together to reexamine an apparently familiar era in the history of computing through new lenses, exploring early digital computing and engineering practice as digital phenomena rather than as engines of mathematics and logic. Most focus on the period 1945 to 1960, the era in which the first electronic digital computers were created and the computer industry began to develop. Because digitality is first and foremost a way of reading objects and encoding information within them, we are foregrounding topics that have until now been viewed as peripheral in the history of computing: betting odds calculators, card file systems, program and data storage, programmable calculators, and digital circuit design practices. Reconceptualizing the \"history of computing\" as study of the \"early digital\" decenters the stored program computer, repositioning it as one of many digital technologies. -- Provided by publisher.
Figuring the past
This innovative analysis of period film presents a new way to examine the ways in which contemporary cinema recreates the historical past. Exploring the relationship between visual motifs and cultural representation, Figuring the Past is a selection of detailed case studies that explore three key figures—the house, the tableau, and the letter. Belen Vidal proposes a new aesthetic framework for the study of period film, looking at a number of important auteurs in the genre, including James Ivory, Martin Scorsese, and Jane Campion. This handsomely illustrated book seeks to position this popular but often understudied genre in its proper place within the academic discipline of cinema studies.
From science to computational sciences : studies in the history of computing and its influence on today's sciences
2011
In 1946 John von Neumann stated that science is stagnant along the entire front of complex problems, proposing the use of largescale computing machines to overcome this stagnation.In other words, Neumann advocated replacing analytical methods with numerical ones.
Charisma and the Fictions of Black Leadership
Social and political change is impossible in the absence of gifted male charismatic leadership—this is the fiction that shaped African American culture throughout the twentieth century. If we understand this, Erica R. Edwards tells us, we will better appreciate the dramatic variations within both the modern black freedom struggle and the black literary tradition.
Mitigating Bias in Metadata
2021
Controlled vocabularies used in cultural heritage organizations (galleries, libraries, archives, and museums) are a helpful way to standardize terminology but can also result in misrepresentation or exclusion of systemically marginalized groups. Library of Congress Subject Headings (LCSH) is one example of a widely used yet problematic controlled vocabulary for subject headings. In some cases, systemically marginalized groups are creating controlled vocabularies that better reflect their terminology. When a widely used vocabulary like LCSH and a controlled vocabulary from a marginalized community are both available as linked data, it is possible to incorporate the terminology from the marginalized community as an overlay or replacement for outdated or absent terms from more widely used vocabularies. This paper provides a use case for examining how the Homosaurus, an LGBTQ+ linked data controlled vocabulary, can provide an augmented and updated search experience to mitigate bias within a system that only uses LCSH for subject headings.
Journal Article
Scientific Support for the Decision Making in the Security Sector
by
Willems, R. F. W. M
,
Shalamanov, V
,
Kounchev, O
in
Decision support systems-Congresses
,
Emergency management-Data processing-Congresses
,
Military planning-Decision making-Congresses
2007
Today's security environment is characterized by deep uncertainty. Threats are being posed not only by adversary (political) forces but may also come from natural challenges (be it energy, water, ecology or whatever). The types of operations that our civil security and military forces find themselves in today comprise a wide variety of tasks. The success criteria for these operations are a safe/secure environment for local population and stable conditions for state building rather than hit-kill ratio's against adversaries - the criteria are soft and the many actors involved may have divergent if not opposing objectives. And where actors intentionally share common objectives, they come from different cultural and organizational backgrounds, and their systems and modus operandi (doctrine) have loose or no connectivity. Under these complex and uncertain conditions decision making is a challenging process. This publication reflect the initial state of a dialogue between specialists in security and specialists in mathematics, computer and information sciences on security topics. Papers included in this volume are naturally subdivided into four parts showing the wide future perspective for synthesis between science and security: Planning for Security; Mathematical, Computer and Information Sciences Methods for Security; Environmental Security; and Dynamic Optimization for Security.
The adaptive optics revolution : a history
2009
Duffner has compiled the history of the most revolutionary breakthrough in astronomy since Galileo pointed his telescope skyward--the technology that will greatly expand our understanding of the universe.
Healthgrid Applications and Core Technologies
by
Breton, V
,
Blanquer, I
,
Solomonides, T
in
Medical care-Computer networks-Congresses
,
Medical informatics-Congresses
,
Medicine-Data processing-Congresses
2010
This book presents the proceedings of HealthGrid 2010, the latest in the annual open forum for the integration of grid technologies, e science and e health methods and their application in biomedicine and healthcare. Previous conferences have highlighted the need to involve all actors, such as physicians, scientists and technologists, and have served to demonstrate the usefulness of grids to potential application domains, at least at the prototype level. More recently, cloud computing seems set to make an impact as a paradigm more readily acceptable in the practice of healthcare informatics, whilst grids may remain the infrastructure of choice for researchers.Included in this volume are the 19 papers selected after review from 42 original submissions for full presentation at the 2010 conference. Additional papers, presented as posters at the conference, are reproduced here in shorter form. The book has four sections: section one contains four papers under the broad heading of 'Socio Economic Aspects and Accessibility', section two: 'Future of Grids, Core Technologies & Data Integration', consists of nine papers and section three comprises a further six papers covering 'Applications'. Section four includes the 'Poster Extended Abstracts'.Of interest to grid middleware and healthgrid application developers, ethicists, security experts and policy makers as well as all users of biomedical and health informatics, this book provides an overview of current trends and developments in this increasingly important field of healthcare.
The relationship between classification research and information retrieval research, 1952 to 1970
2017
Purpose
The purpose of this paper is to present the initial relationship between the Classification Research Group (CRG) and the Center for Documentation and Communication Research (CDCR) and how this relationship changed between 1952 and 1970. The theory of normative behavior and its concepts of worldviews, social norms, social types, and information behavior are used to characterize the relationship between the small worlds of the two groups with the intent of understanding the gap between early classification research and information retrieval (IR) research.
Design/methodology/approach
This is a mixed method analysis of two groups as evidenced in published artifacts by and about their work. A thorough review of historical literature about the groups as well as their own published works was employed and an author co-citation analysis was used to characterize the conceptual similarities and differences of the two groups of researchers.
Findings
The CRG focused on fundamental principles to aid classification and retrieval of information. The CDCR were more inclined to develop practical methods of retrieval without benefit of good theoretical foundations. The CRG began it work under the contention that the general classification schemes at the time were inadequate for the developing IR mechanisms. The CDCR rejected the classification schemes of the times and focused on developing punch card mechanisms and processes that were generously funded by both government and corporate funding.
Originality/value
This paper provides a unique historical analysis of two groups of influential researchers in the field of library and information science.
Journal Article
User Centred Networked Health Care
by
Moen, A
,
Aarts, J
,
Andersen, S. K
in
Congresses
,
Integrated delivery of health care
,
Medical informatics
2011
This volume of Studies in Health Technology and Informatics - User Centred Networked Health Care - Proceedings of MIE 2011 - contributes to the discussion of the unresolved challenges arising for 21-century health care. It highlights a number of design issues and explores experiences of health professionals and patients working and living in ICT enabled environments. This ties into the Scandinavian tradition of ICT development; to actively involve users in all aspects of the design and implementation of complex technology in the workplace. The book covers a broad range of methodological and application oriented health informatics achievements at regional, national, and international level. Aspects featured include health records, standards, professional practice development, telemedicine, social media in health care, software development, strategies for user involvement, personalized health and benefits for patient care. Attention is also given to development for sustainable use which may arise when health professionals collaborate with colleagues and patients in virtual teams. Current and upcoming challenges posed for health informatics require critical appraisal of strategies for user involvement, deployment and sustainable use of information systems and new forms of patient-provider collaboration. The concept of 'meaningful use' opens up additional perspectives and offers exciting opportunities to ensure that users - broadly understood as health providers, patients and their families or consumers at large - are offered workable solutions relevant to their needs.