Full text of every article ever published by the Association for Computing Machinery (ACM) and bibliographic citations from major publishers in computing. [1954 - present]
Provides full-text access to journals, magazines, transactions, conference proceedings and newsletters published by the ACM (Association of Computing Machinery). Includes most historical and all current publications.
Type "berkeley.edu" to login with Calnet. .
Online learning platform with videos and full courses covering software, technology, business and creative skills. Includes courses on Adobe and Microsoft tools, as well as a variety of other web, audio, video, IT, and education topics.
An interdisciplinary search through 22 of the the social sciences indexes on the ProQuest platform.
An interdisciplinary metasearch through 22 of the the social sciences indexes on the ProQuest platform. Includes EconLit, International Bibliography of the Social Sciences (IBSS), Linguistics and Language Behavior Abstracts, PAIS, PsycInfo, Sociological Abstracts, Worldwide Political Science Abstracts and more.
SAGE Research Methods’ coverage spans the full range of research methods used in the social and behavioral sciences, plus a wide range of methods commonly used in science, technology, medicine, and the humanities.
In Good Charts, dataviz maven Scott Berinato provides an essential guide to how visualization works and how to use this new language to impress and persuade. Dataviz today is where spreadsheets and word processors were in the early 1980s--on the cusp of changing how we work. Berinato lays out a system for thinking visually and building better charts through a process of talking, sketching, and prototyping.
Hello, Robot. Design Between Human and Machine investigates how robotics is becoming part of our everyday lives. The exhibitions shows that design in its traditional function as a mediator is indispensable if robots are to become a visible reality and not just remain hidden in washing machines, cars and cash machines.
he book gives an up-to-date multiaspect exposition of contemporary studies in the field of information and related areas. It presents most recent achievements, ideas and opinions of leading researchers in this domain reflecting their quest for advancing information science and technology.
We live in strange times. A machine plays the strategy game Go better than any human; upstarts like Apple and Google destroy industry stalwarts such as Nokia; ideas from the crowd are repeatedly more innovative than corporate research labs.MIT's Andrew McAfee and Erik Brynjolfsson know what it takes to master this digital-powered shift: we must rethink the integration of minds and machines, of products and platforms, and of the core and the crowd.
How can one efficiently and effectively turn massive, unstructured text into structured representation so as to further lay the foundation for many other downstream text mining applications? In this book, we investigated one promising paradigm for representing unstructured text, that is, through automatically identifying high-quality phrases from innumerable documents.
In a series of seven explorations of contemporary sharing, Matthew David shows that in each case sharing surpasses markets, private ownership and intellectual property rights in fostering motivation, creativity, innovation, production, distribution and reward.
This book offers an overview of social media usage in Japan and describes its role in society during mid-level disruptions by natural disasters. Conceived during and after the Great East Japan Earthquake that devastated large portions of the north-eastern area of Japan, this volume addresses the links between Japanese civil society and the social media scene, using both traditional hypothesis testing, social surveys and large-scale big data analysis to provide insight into the development of an online community for connecting citizens.
This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists.
This book offers a systematic framework for thinking about the relationship between language and technology and an argument for interweaving thinking about technology with thinking about language. The main claim of philosophy of technology is that technologies are not mere tools and artefacts not mere things, but crucially and significantly shape what we perceive, do, and areis re-thought in a way that accounts for the role of language in human technological experiences and practices.
This is the story of surveillance in Britain and the United States, from the detective agencies of the late nineteenth century to "wikileaks" and CIA whistle-blower Edward Snowden in the twenty-first. Written by prize-winning historian and intelligence expert Rhodri Jeffreys-Jones, it is the first full overview of its kind.
In this incisive new book, Milton Mueller argues that the "fragmentation" diagnosis misses the mark. The rhetoric of "fragmentation" camouflages the real issue: the attempt by governments to align information flows with their jurisdictional boundaries.
Off-campus users are prompted to login via CalNet for online resources from library sites, including OskiCat and guides. Install the EZproxy bookmarklet to jump to the Cal login site when you encounter licensed library resources via Google or the open web.
VPN (Virtual Private Network)
Install the VPN client software on your computer. Open and connect to the "Library VPN" to establish a secure connection with the campus network each time you want to access any library-licensed resources.
A guide to library resources that allow some kind of support for text analysis applications. New
The UC Berkeley Library maintains a research-level collection of materials which support the research and teaching programs of the School of Information (I School). The I School is a graduate research and education community "committed to expanding access to information and to improving its usability, reliability, and credibility while preserving security and privacy. This requires the insights of scholars from diverse fields—information and computer science, design, social sciences, management, law, and policy."
Photo credit: Berkeley, South Hall (in 1961, now home of the I School) by Roger Wollstadt on Flickr.