Big Data in History (Palgrave Pivot) by P. Manning

By P. Manning

massive info in background introduces the venture to create a world-historical archive, tracing the final 4 centuries of historic dynamics and alter. Chapters tackle the archive's total plan, the way to interpret the earlier via an international archive, the missions of amassing files, linking neighborhood info into worldwide styles, and exploring the results.

Show description

Read or Download Big Data in History (Palgrave Pivot) PDF

Best computer information theory books

Media Computing: Computational Media Aesthetics (The International Series in Video Computing)

Characteristically, clinical fields have outlined limitations, and scientists paintings on study difficulties inside these limitations. although, every now and then these obstacles get shifted or blurred to conform new fields. for example, the unique aim of desktop imaginative and prescient used to be to appreciate a unmarried photograph of a scene, through determining gadgets, their constitution, and spatial preparations.

Interference Cancellation Using Space-Time Processing and Precoding Design: 206 (Signals and Communication Technology)

Interference Cancellation utilizing Space-Time Processing and Precoding layout introduces unique layout how you can in achieving interference cancellation, low-complexity deciphering and entire variety for a chain of multi-user platforms. In multi-user environments, co-channel interference will slash the functionality of instant communications platforms.

Topics in Cryptology –- CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Lecture Notes in Computer Science)

This booklet constitutes the refereed lawsuits of the Cryptographer's song on the RSA convention 2015, CT-RSA 2015, held in San Francisco, CA, united states, in April 2015. The 26 papers offered during this quantity have been rigorously reviewed and chosen from 111 submissions. the focal point of the music is on following topics: timing assaults, layout and research of block ciphers, characteristic and id dependent encryption, club, safe and effective implementation of AES dependent Cryptosystems, selected ciphertext assaults in idea and perform, algorithms for fixing not easy difficulties, buildings of hash services and message authentication codes, safe multiparty computation, authenticated encryption, detecting and tracing malicious actions, implentation assaults on exponentiation algorithms and homomorphic encryption and its purposes.

Electronic Government and the Information Systems Perspective: 6th International Conference, EGOVIS 2017, Lyon, France, August 28-31, 2017, Proceedings (Lecture Notes in Computer Science)

This publication constitutes the refereed lawsuits of the sixth International Conference on digital executive and the knowledge Systems Perspective, EGOVIS 2017, held in Lyon, France, in August 2017. The 20 revised complete papers presented were conscientiously reviewed and chosen from 24 submissions. The papers areorganized within the following topical sections: digitalization and transparency; open info ecosystems; clever platforms in e-government; e-government study and clever platforms; m-government and inclusion; e-government situations - facts wisdom administration; and data administration within the context of e-government.

Extra resources for Big Data in History (Palgrave Pivot)

Sample text

Download PDF sample

Rated 4.68 of 5 – based on 42 votes