RFID: Human Agency and Meaning in Information-Intensive Environments
暂无分享,去创建一个
[1] Mark Andrejevic,et al. Monitored Mobility in the Era of Mass Customization , 2003 .
[2] S. Graham. Software-sorted geographies , 2005 .
[3] Hubert L. Dreyfus,et al. What computers still can't do - a critique of artificial reason , 1992 .
[4] Manish Bhuptani,et al. RFID Field Guide: Deploying Radio Frequency Identification Systems , 2005 .
[5] Vida Bajc. Introduction Debating Surveillance in the Age of Security , 2007 .
[6] Mike Crang,et al. Sentient Cities: Ambient Intelligence and the Politics of Urban Space , 2012 .
[7] N. K. Hayles. My Mother Was a Computer: Digital Subjects and Literary Texts , 2005 .
[8] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[9] Neil Gershenfeld,et al. When things start to think , 1999 .
[10] Martin Heidegger,et al. The Fundamental Concepts of Metaphysics: World, Finitude, Solitude , 1983 .
[11] Dana Cuff,et al. Pervasive Computing: Embedding the Public Sphere , 2004 .
[12] Roger Burrows,et al. Sorting Places Out? Towards a social politics of neighbourhood informatization , 2004 .
[13] Dana Cuff,et al. Pervasive Computing: Embeddingthe Public Sphere , 2005 .
[14] Leslie Marsh. Natural-Born Cyborgs: Minds, Technologies, and the Future of Human Intelligence , 2009 .
[15] Dana Cuff. Pervasive Computing and the Public Realm , 2003 .
[16] N. Thrift. Remembering the Technological Unconscious by Foregrounding Knowledges of Position , 2004 .
[17] Jörg Rech,et al. Knowledge Discovery in Databases , 2001, Künstliche Intell..
[18] K. Gallagher. Darwin’s Dangerous Idea: Evolution and the Meanings of Life , 1996 .
[19] Jordan Crandall,et al. Anything That Moves: Armed Vision , 1999 .
[20] A. Galloway. Intimations of everyday life: Ubiquitous computing and the city , 2004 .
[21] Alexander Galloway,et al. Protocol, or, How Control Exists after Decentralization , 2001 .
[22] Charles Meadows. Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watch Your Every Move , 2010, J. Assoc. Inf. Sci. Technol..
[23] Richard K. Pruett,et al. Identification - Friend or Foe? The Strategic Uses and Future Implications of the Revolutionary New ID Technologies , 2006 .
[24] Roger Burrows,et al. Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment , 1995 .