Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)

Buy

The sheer computing power of modern information technology is changing the face of research not just in science, technology and mathematics, but in humanities and cultural studies too. Recent decades have seen a major shift both in attitudes and deployment of computers, which are now vital and highly effective tools in disciplines where they were once viewed as elaborate typewriters. This revealing volume details the vast array of computing applications that researchers in the humanities now have recourse to, including the dissemination of scholarly information through virtual ‘co-laboratories’, data retrieval, and the modeling of complex processes that contribute to our natural and cultural heritage. One key area covered in this book is the versatility of computers in presenting images and graphics, which is transforming the analysis of data sets and archaeological reconstructions alike.

The papers published here are grouped into three broad categories that cover mathematical and computational methods, research developments in information systems, and a detailed portrayal of ongoing work on documenting, restoring and presenting cultural monuments including the temples in Pompeii and the Banteay Chhmar temples of the Angkorian period in present-day Cambodia. Originally presented at a research workshop in Heidelberg, Germany, they reflect the rapidly developing identity of computational humanities as an interdisciplinary field in its own right, as well as demonstrating the breadth of perspectives in this young and vibrant research area.

(HTML tags aren't allowed.)

Mining eBay Web Services: Building Applications with the eBay API
Mining eBay Web Services: Building Applications with the eBay API
Improved Speed, Accuracy, and Convenience—Yours for the Taking

eBay is continuously improving the features it offers buyers and sellers. Now, the biggest improvements are ones you can build for yourself.

Mining eBay Web Services teaches you to create custom
...
Interest Rate Markets: A Practical Approach to Fixed Income (Wiley Trading)
Interest Rate Markets: A Practical Approach to Fixed Income (Wiley Trading)

How to build a framework for forecasting interest rate market movements

With trillions of dollars worth of trades conducted every year in everything from U.S. Treasury bonds to mortgage-backed securities, the U.S. interest rate market is one of the largest fixed income markets in the world.

Interest Rate Markets:...

Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...


MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide: Exam 70-643
MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide: Exam 70-643

Microsoft has recently changed its certification program to contain three primary series: Technology, Professional, and Architect. The Technology Series of certifications is intended to allow candidates to target specific technologies and is the basis for obtaining the Professional Series and Architect Series of certifications. The...

Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy