MANIPULATING INFORMATION AND MANIPULATING PEOPLE
نویسندگان
چکیده
منابع مشابه
Manipulating higher dimensional spatial information
Real-world phenomena have traditionally been modelled in a GIS in two and three dimensions. However, powerful insights can be gained by the integration of additional non-spatial dimensions, such as time and scale, in a higher dimensional spatial model. While this theory is conceptually sound, there is a lack of understanding of its consequences when applied to real world geographic information....
متن کاملManipulating Games by Sharing Information
We address the issue of manipulating games through communication. In the specific setting we consider (a variation of Boolean games), we assume there is some set of environment variables, the values of which are not directly accessible to players; the players have their own beliefs about these variables, and make decisions about what actions to perform based on these beliefs. The communication ...
متن کاملCapturing and Manipulating Context-sensitive Program Information
Designers of context-sensitive program analyses need to take special care of the memory consumption of the analysis results. In general, they need to sacrifice accuracy to cope with restricted memory resources. We introduce χterms as a general data structure to capture and manipulate context-sensitive analysis results. A χ-term is a compact representation of arbitrary forward program analysis d...
متن کاملVisualizing and Manipulating Complex Calendar Scheduling Information
Calendar scheduling is a difficult task for people who have overbooked calendars and many constraints. We are collaborating with artificial intelligence researchers, who are developing an intelligent calendar scheduling agent that gathers availability constraints, searches for times that satisfy the constraints, and negotiates with invitees when no satisfactory time is found for the constraints...
متن کاملInformation flow security in tree-manipulating processes
This work describes methods to verify information flow properties of processes manipulating tree-structured data. The developed techniques can be applied, e.g., to enterprise workflows and web service technologies, where data is frequently represented in the form of XML documents. These systems are highly security critical, because they may be in control of important processes of organizations,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Critical Discourse Studies
سال: 2013
ISSN: 1740-5904,1740-5912
DOI: 10.1080/17405904.2013.852982