Updating search results...

Search Resources

2946 Results

View
Selected filters:
  • Computer Science
The Dating Equation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Python IF-ELSE activity - "The Dating Equation" - for CS0 students. Part of the CUNY CS04All project.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
College of Staten Island
Author:
City University Of New York - Graduate Center
Domanski Robert J
Robert J Domanski
Date Added:
06/04/2019
Day 2 Keynote
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Michael Ridley, Librarian Emeritus, University of Guelph delivers the Keynote for day two of the Fantastic Futures ai4LAM 2023 annual conference. This item belongs to: movies/fantastic-futures-annual-international-conference-2023-ai-for-libraries-archives-and-museums-02.

This item has files of the following types: Archive BitTorrent, Item Tile, MP3, MPEG4, Metadata, PNG, Thumbnail, h.264 720P, h.264 IA

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
AI4LAM
Provider Set:
Fantastic Futures 2023 Conference Session Recordings
Author:
Michael Ridley
Date Added:
05/07/2024
Day of AI
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This resource is to support teachers and educators to run Day of AI activities in their classrooms through curriculum packages and teacher training, all of which is available at no cost to participants.
Developed by leading faculty and educators from MIT RAISE, the curriculum features up to four hours of hands-on activities that engage kids in creative discovery, discussion, and play as they learn the fundamentals of AI, investigate the societal impact of these technologies, and bring artificial intelligence to life through lessons and activities that are accessible to all, even those with no computer science or technical background.

Subject:
Applied Science
Computer Science
Education
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
None, MIT RAISE
Date Added:
02/01/2022
Debugging Scratch Project
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will debug a Scratch project containing many bugs that they identified in Lesson 8, Debugging Mistakes (unplugged).

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Author:
NYC Computer Science for All
Date Added:
03/31/2021
Decimal system refresher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Review how the decimal number system works before diving into the binary number system. The decimal number system and binary number system work the same way; the only difference is what each digit represents (0-9 versus 0/1). Created by Pamela Fox.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Pamela Fox
Date Added:
07/14/2021
Decision Intelligence You Tube Page
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

***This resource is published by Cassie Kozyrhov.Cassie is Head of Decision Intelligence at Google and this is her video channel. It provides short video clips on stats, AI, data, and decision science. May serve as a supplemental resource.

Subject:
Computer Science
Educational Technology
Material Type:
Activity/Lab
Author:
Cyber Citizenship Initiative
Date Added:
08/08/2021
Decision Making in Large Scale Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course is an introduction to the theory and application of large-scale dynamic programming. Topics include Markov decision processes, dynamic programming algorithms, simulation-based algorithms, theory and algorithms for value function approximation, and policy search methods. The course examines games and applications in areas such as dynamic resource allocation, finance and queueing networks.

Subject:
Applied Science
Computer Science
Engineering
Information Science
Mathematics
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
De Farias, Daniela
Date Added:
02/01/2004
Decisions, Games, and Rational Choice
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Foundations and philosophical applications of Bayesian decision theory, game theory and theory of collective choice. Why should degrees of belief be probabilities? Is it always rational to maximize expected utility? If so, why and what is its utility? What is a solution to a game? What does a game-theoretic solution concept such as Nash equilibrium say about how rational players will, or should, act in a game? How are the values and the actions of groups, institutions and societies related to the values and actions of the individuals that constitute them?

Subject:
Applied Science
Arts and Humanities
Computer Science
Information Science
Mathematics
Philosophy
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Stalnaker, Robert
Date Added:
02/01/2008
Deep  Learning for CyberSecurity
Unrestricted Use
CC BY
Rating
0.0 stars

Deep Learning For CyberSecurityDeep learning, a subfield of AI based on multiple layers of artificial neural networks, has established a key role in solving complicated cybersecurity problems due to its ability to manage complex data structures, its automatic feature extraction, and its efficiency in recognizing patterns and correlations

Subject:
Computer Science
Material Type:
Reading
Author:
SWETHA A
Date Added:
03/30/2023
The Deep Physiological Connections That Form Among Choir Singers
Unrestricted Use
CC BY
Rating
0.0 stars

This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:

"A new study from the Max Planck Institute for Human Development unveils the deep bodily connections that can form among choir singers Researchers tracked different physiological variables as a choir sung and used algorithms to uncover connections between them Aside from a blending of voices, they found that choir singers’ heart rates and breathing patterns sync up when performing as a group This merging was coupled to the vocalization patterns of the singers The conductor’s hand movements also caused a shared physiological response among the singers In essence, the work suggests that a choir can be considered a type of coherent physiological entity… or, as the researchers suggest, a superorganism Viktor Müller, Julia A.M. Delius, Ulman Lindenberger. Complex networks emerging during choir singing..."

The rest of the transcript, along with a link to the research itself, is available on the resource itself.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Reading
Provider:
Research Square
Provider Set:
Video Bytes
Date Added:
09/20/2019
Deepfakes Lesson Remix, Adding Media Literacy
Unrestricted Use
Public Domain
Rating
0.0 stars

Students examine what deepfakes are and how media literacy can help us create solutions for media mishaps (such as deepfakes). Throughout this lesson, students will use critical thinking skills in order to understand manipulated media content.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Lesson Plan
Module
Reading
Author:
Shana Ferguson
Ragan White and
Date Added:
04/18/2022
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alexandre Bergel
Damien Cassou
Jannik Laval
Stéphane Ducasse
Date Added:
11/08/2018
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Digital Suppression and Cryptographic Defense of Social Movements

Short Description:
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard

Word Count: 67802

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Political Science
Social Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
03/29/2021
Delay Insentitive Circuits -- Structures, Semantics, and Strategies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The design of concurrent distributed hardware systems is a major challenge for engineers today and is bound to escalate in the future, but engineering education continues to emphasize traditional tools of logic design that are just not up to the job. For engineers tackling realistic projects, improvised attempts at synchronization across multiple clock domains have long been a fact of life. Prone to hazards and metastability, these ad hoc interfaces could well be the least trustworthy aspects of a system, and typically also the least able to benefit from any readily familiar textbook techniques of analysis or verification.

Progress in the long run depends on a change of tactics. Instead of the customary but inevitably losing battle to describe complex systems in terms of their stepwise time evolution, taking their causal relationships and handshaking protocols as a starting point cuts to the chase by putting the emphasis where it belongs. This way of thinking may call for setting aside a hard earned legacy of practice and experience, but it leads ultimately to a more robust and scalable methodology.

Delay insensitive circuits rely on local coordination and control from the ground up. The most remarkable consequence of adhering to this course is that circuits can get useful things done without any clock distribution network whatsoever. Because a handshake acknowledgment concludes each interaction among primitive components and higher level subsystems alike, a clock pulse to mark them would be superfluous. This effect can bring a welcome relief to projects whose timing infrastructure would otherwise tend to create more problems than it solves.

The theory of delay insensitive circuits is not new but has not yet attracted much attention outside of its research community. At best ignored and at worst discouraged in standard curricula, this topic until now has been accessible only by navigating a sea of conference papers and journal articles, some of them paywalled. Popular misconceptions and differing conventions about terminology and notation have posed further barriers to entry. To address this need, this book presents a unified account of delay insensitive circuits from first principles to cutting edge concepts, subject only to an undergraduate-level understanding of discrete math. In an approachable tutorial format with numerous illustrations, exercises, and over three hundred references, it guides an engineering professional or advanced student towards proficiency in this extensive field.

Subject:
Applied Science
Career and Technical Education
Computer Science
Electronic Technology
Engineering
Material Type:
Textbook
Author:
Dennis Furey
Date Added:
07/16/2019
Deleting Dystopia: Re-Asserting Human Priorities in the Age of Surveillance Capitalism
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Short Description:
Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Long Description:
The IT revolution has brought many surprises. Among them is the fact that intensive surveillance and the related abuse of personal data have fallen into the hands of powerful digital oligarchies. Accounts of the increasingly repressive uses of advanced technologies and the subsequent ‘dumbing down’ of entire populations cast dark shadows over future prospects that are beginning to look increasingly dystopian.

Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Word Count: 53352

ISBN: 978-0-6487698-7-3

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Education
Material Type:
Textbook
Provider:
University of Southern Queensland
Author:
Richard A. Slaughter
Date Added:
09/01/2021
Delftse Foundations of Computation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
11/01/2018
Delftse Foundations of Computation 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
08/25/2022