Privacy as a Machine
暂无分享,去创建一个
[1] Alaric Kohler,et al. To Think Human out of the Machine Paradigm: Homo Ex Machina , 2010, Integrative psychological & behavioral science.
[2] E. Poovammal,et al. Utility Independent Privacy Preserving Data Mining on Vertically Partitioned Data , 2009 .
[3] T. Kuhn,et al. The Structure of Scientific Revolutions. , 1964 .
[4] Sabah Al-Fedaghi,et al. Flow-Based Specification of Time Design Requirements , 2015 .
[5] Sabah Al-Fedaghi. Heraclitean Ontology for Specifying Systems , 2015 .
[6] Jukka Vuorinen,et al. Pacific Asia Conference on Information Systems ( PACIS ) 8-11-2009 SECURITY AS A MACHINE-STRUGGLING BETWEEN ORDER AND CHAOS , 2013 .
[7] Max E. Valentinuzzi,et al. Understanding the Human Machine: A Primer for Bioengineering , 2004 .
[8] M. Boden,et al. Mind As Machine: A History of Cognitive Science Two-Volume Set , 2006 .
[9] F. Guattari,et al. Capitalism and Schizophrenia I , 1983 .
[10] Jukka Vuorinen. Parasitic Order Machine. A Sociology and Ontology of Information Securing , 2014 .
[11] S. Al-Fedaghi. Conceptualization of Various and Conflicting Notions of Information , 2014 .
[12] Sabah Al-Fedaghi. On a Flow-Based Paradigm in Modeling and Programming , 2015 .
[13] S. Al-Fedaghi. Diagrammatic Representation as a Tool for Clarifying Logical Arguments , 2015 .
[14] GLENN,et al. Philosophical Views on the Value of Privacy , 1966 .
[15] Laura A. Rosenbury,et al. Sex In and Out of Intimacy , 2010 .
[16] E. Crouch,et al. Man and Machine , 1991, British Journal of Psychiatry.
[17] C. W. Bain,et al. Man and Machine , 1928, Nature.
[18] Sabah Al-Fedaghi,et al. Computer Science Approach to Information-Like Artifacts as Exemplified by Memes , 2015 .
[19] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[20] J. Moor. The ethics of privacy protection , 1990 .