To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
We review the scholarly contributions that utilise natural language processing (NLP) techniques to support the design process. Using a heuristic approach, we gathered 223 articles that are published in 32 journals within the period 1991–present. We present state-of-the-art NLP in-and-for design research by reviewing these articles according to the type of natural language text sources: internal reports, design concepts, discourse transcripts, technical publications, consumer opinions and others. Upon summarising and identifying the gaps in these contributions, we utilise an existing design innovation framework to identify the applications that are currently being supported by NLP. We then propose a few methodological and theoretical directions for future NLP in-and-for design research.
In this article, we explore the challenges of global governance and the particular challenge presented by global data governance. We discuss a range of challenges to developing meaningful global governance institutions for regulating how companies and governments around the world manage and utilize consumer data. These challenges are compounded by their global nature and the complexities of Internet-based technologies. We argue that the following gaps exist for effective global data governance: (a) there is no overarching global framework for protecting consumer data, and it is partial and incomplete; (b) there is a lack of data protection for international data transfers, as much of the regulation that is being developed is not global in scale; and (c) new areas of data collection and use compound concerns to effective data governance in a globalized digital world. Moreover, we highlight important needs in terms of both global governance and impending challenges related to current and new uses of data. Any global governance framework should recognize the need for an iterative process where communication is ongoing between the necessary stakeholders. Agreements should incorporate common goals to maximize the potential development of global data governance norms. However, goals must remain flexible to the different data environments across nation-states while maintaining a global scope to ensure data protection. In addition, any agreement should consider the emerging challenges in this area. These challenges include new methods of data collection and use, as well as protecting individuals from manipulation and undue influence based on how their data are being used, processed, and collected.
This paper outlines a procedure for assessing the quality of failure explanations in engineering failure analysis. The procedure structures the information contained in explanations such that it enables to find weak points, to compare competing explanations, and to provide redesign recommendations. These features make the procedure a good asset for critical reflection on some areas of the engineering practice of failure analysis and redesign. The procedure structures relevant information contained in an explanation by means of structural equations so as to make the relations between key elements more salient. Once structured, the information is examined on its potential to track counterfactual dependencies by offering answers to relevant what-if-things-had-been-different questions. This criterion for explanatory goodness derives from the philosophy of science literature on scientific explanation. The procedure is illustrated by applying it to two case studies, one on Failure Analysis in Mechanical Engineering (a broken vehicle shaft) and one on Failure Analysis in Civil Engineering (a collapse in a convention center). The procedure offers failure analysts a practical tool for critical reflection on some areas of their practice while offering a deeper understanding of the workings of failure analysis (framing it as an explanatory practice). It, therefore, allows to improve certain aspects of the explanatory practices of failure analysis and redesign, but it also offers a theoretical perspective that can clarify important features of these practices. Given the programmatic nature of the procedure and its object (assessing and refining explanations), it extends work on the domain of computational argumentation.
A typical modern computational system is structured like a tower, with eachlayer’s proper behavior contingent on the correctness of the onebelow. The website that you use to send money to a friend relies on both astack of networking protocols (HTTP relying on TCP, which is relying on IP,etc.), as well as a stack of applications on your computer or your phone(your browser relying on your operating system, which is relying on thehardware itself). A key theme in computer science is this idea ofabstraction: that, so long as it’s workingproperly, you can rely on the next layer in one of these towers (or afunction in a large program, or . ..) without worryingabout how exactly it works. You just have to trustthat it works.
from
Part II
-
Wireless Networks for Machine Learning
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
Imagine converting a color photograph to grayscale (as in Figure 2.1).Implementing this conversion requires interacting with a slew offoundational data types (the basic “kinds of things”) thatshow up throughout CS. A pixel is a sequence of three colorvalues, red, green, and blue. (And an image is a two-dimensional sequence ofpixels.)
Studies that locate memory entirely within the head may pay less attention to the properties, practices or cultures of the media with which people remember than studies of ‘memory in the wild’, where memory is seen to extend beyond the individual, into the distributed activities of people and material things. While memory in the head is, apparently, individual and susceptible to universal effects, memory in the wild is emergent and relational. Studies of memory in the wild, therefore, produce results that are harder to pin down but may form a stronger basis for interpreting the importance of context. It is an important, interdisciplinary challenge to reconcile evidence from studies based on these different conceptions, so that we can better understand how people remember and forget, individually and collectively, and the relationship between context, environment, and memory. I argue that wherever memory is located or studied, all remembering can be framed as in the wild, and that doing so supports ecological validity, conceptual precision, reflexivity, and realistic application of conclusions beyond the research context. A key part of my argument is that the relationship between media, technology, and memory is situated, highly complex, and not easily generalisable. Remembering in the wild supports the conceptual precision needed to understand the subtle and entangled implications of technological change in relation to memory.
from
Part I
-
Machine Learning for Wireless Networks
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
from
Part II
-
Wireless Networks for Machine Learning
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
from
Part I
-
Machine Learning for Wireless Networks
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
from
Part I
-
Machine Learning for Wireless Networks
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
from
Part I
-
Machine Learning for Wireless Networks
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
from
Part II
-
Wireless Networks for Machine Learning
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
from
Part I
-
Machine Learning for Wireless Networks
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey
This book is designed for an undergraduate student who has taken a computerscience class or three. Most likely, you are a sophomore or juniorprospective or current computer science major taking your firstnon-programming-based CS class. If you are a student in this position, youmay be wondering why you’re taking this class (or why youhave to take this class!).
from
Part I
-
Machine Learning for Wireless Networks
Edited by
Yonina C. Eldar, Weizmann Institute of Science, Israel,Andrea Goldsmith, Princeton University, New Jersey,Deniz Gündüz, Imperial College of Science, Technology and Medicine, London,H. Vincent Poor, Princeton University, New Jersey