1 - 14
- Norwood, N.J. : Ablex Pub. Corp., 1986.
- Description
- Book — xviii, 398 p. : ill. ; 24 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TA1632 .F76 1986 | Available |
TA1632 .F76 1986 | Available |
2. The parts of perception [1987]
- Pentland, Alex, 1952-
- Menlo Park, CA : Center for the Study of Language and Information/SRI International, c1987.
- Description
- Book — 53 p. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
P121 .P295 N.27:NO.77 | Available |
- Cambridge ; New York : Cambridge University Press, 1998.
- Description
- Book — xi, 348 p. : ill. ; 24 cm.
- Summary
-
- Foreword
- Preface
- Part I. New Interfaces and Applications: 1. Smart rooms: machine understanding of human behavior A. Pentland
- 2. GestureComputer - history, design and applications C. Maggioni, and B. Kammerer
- 3. Human reader: a vision-based man-machine interface K. Mase
- 4. Visual sensing of humans for active public interfaces K. Waters, J. Rehg, M. Loghlin, S. B. King, and D. Terzopoulos
- 5. Pointing with uncalibrated stereo vision R. Cipolla, and N. J. Hollinghurst
- Part II. Tracking Human Action: 6. Tracking faces A. Gee, and R. Cipolla
- 7. Towards automated, real-time, facial animation B. Bascle, A. Blake, and J. Morris
- 8. Interfacing through visual pointers C. Colombo, A. Del Bimbo, and S. De Magistris
- 9. Monocular tracking of the human arm in 3D E. Di Bernado, L. Goncalves, and P. Perona
- 10. Looking at people in action - an overview Y. Yacoob, L. Davis, M. Black, D. Gavrila, T. Horprasert, and C. Morimoto
- Part III. Gesture Recognition and Interpretation: 11. A framework for gesture generation and interpretation J. Cassell
- 12. Model-based interpreation of faces and hand gestures C. J. Taylor, A. Lanitis, T. F. Cootes, G. Edwards, and T. Ahmad
- 13. Recognition of handsigns from complex backgrounds J. J. Weng, and Y. Cui
- 14. Probabilistic models of verbal and body gestures C. Bregler, S. Omohundro, M. Covell, M. Slaney, S. Ahmad, D. Forsyth, and J. Feldman
- 15. Looking at human gestures M. Yachida, Y. Iwai
- Ackowledgements
- Bibliography
- List of contributors.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA76.9 .H85 C658 1998 | Available |
- Pentland, Alex, 1952-
- Cambridge, Mass. : MIT Press, c2008.
- Description
- Book — xvii, 184 p. ; 22 cm.
- Summary
-
- Preface: A God's eye view
- Honest signals
- Social roles
- Reading people
- Survival signals
- Network intelligence
- Sensible organizations
- Sensible societies.
(source: Nielsen Book Data)
- Online
- International Workshop on Social Signal Processing (2nd : 2010 : Florence, Italy)
- New York, N.Y. : Association for Computing Machinery, ©2010
- Description
- Book — 1 online resource : illustrations (some color) Digital: text file.
- Pentland, Alex, 1952-
- New York : The Penguin Press, 2014.
- Description
- Book — x, 300 pages : illustrations ; 22 cm
- Online
7. New solutions for cybersecurity [2018]
- Cambridge, Massachusetts : MIT Press, [2018] [Piscataqay, New Jersey] : IEEE Xplore, [2018]
- Description
- Book — 1 online resource (504 pages).
- Summary
-
- Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY;
- CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives;
- CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksâ#x80; #x94; Applied to TJX Cyberattack;
- CHAPTER 3 Measuring Stakeholdersâ#x80; #x99; Perceptions of Cybersecurity for Renewable Energy Systems;
- CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE;
- CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
- CHAPTER 6 Fundamental Trustworthiness Principles in CHERI
- CHAPTER 7 ISPâ#x80; #x94; Hardware Enforcement of Security Policies;
- CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists;
- CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS;
- CHAPTER 10 Who's Afraid of the Dark Web?;
- CHAPTER 11 Social Physics and Cybercrime;
- CHAPTER 12 Behavioral Biometrics;
- CHAPTER 14 Owner Centric Access Management for IoT Data;
- CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
- CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
(source: Nielsen Book Data)
8. New solutions for cybersecurity [2018]
- Cambridge, MA : MIT Press, [2018]
- Description
- Book — 1 online resource
- Summary
-
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives
- Altshuler, Yaniv, author.
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource (ix, 238 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Introduction to Swarm Search.- Cooperative "Swarm Cleaning" of Stationary Domains.- Swarm Search of Expanding Regions in Grids: Lower Bounds.- Swarm Search of Expanding Regions in Grids: Upper Bounds.- The Search Complexity of Collaborative Swarms Expanding Z2 Grid Regions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Revised and expanded edition - Cambridge : MIT Press, 2019
- Description
- Book — 1 online resource (288 pages)
- Revised and expanded edition - Cambridge : MIT Press, 2019 [Piscataqay, New Jersey] : IEEE Xplore, [2019]
- Description
- Book — 1 online resource (288 pages)
- Summary
-
How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data. Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted. Contributors Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind An MIT Connection Science and Engineering Book.
(source: Nielsen Book Data)
12. Building the new economy : data as capital [2021]
- Pentland, Alex, 1952- author.
- Cambridge, Massachusetts : The MIT Press, [2021]
- Description
- Book — vi, 467 pages : illustrations ; 21 cm
- Summary
-
- Building the new economy : what we need and how to get there
- Building data cooperatives
- Shared data : backbone of a new knowledge economy
- Empowering innovation through data cooperatives
- From securitization to tokenization
- The tradecoin system
- Health IT : algorithms, privacy, and data
- Narrow banks and fiat-backed tokens
- Stable network dynamics in a tokenized financial ecosystem
- Toward an ecosystem of trusted data and AI
- Stablecoins
- Interoperability of distributed systems
- Exhchange Networks for virtual assets
- Conclusion: Legal algorithms
- Online
Law Library (Crown)
Law Library (Crown) | Status |
---|---|
Basement | Request (opens in new tab) |
HG1710 .P46 2021 | Unknown |
13. Building the new economy : data as capital [2021]
- Cambridge, Massachusetts : The MIT Press, [2021]
- Description
- Book — 1 online resource.
- Summary
-
"This book proposes blockchain-based currencies, open algorithms, and data cooperatives as the foundation of a new economy that is decentralized, resilient, and secure"-- Provided by publisher.
- Cambridge, Massachusetts : The MIT Press, [2022]
- Description
- Book — 1 online resource.
- Summary
-
"Academic, industry, and government experts provide a global survey of the financial services sector's transformation by AI, data science, and blockchain"-- Provided by publisher.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.