Browse Results

Showing 49,151 through 49,175 of 61,568 results

Search-Based Software Engineering: 16th International Symposium, SSBSE 2024, Porto de Galinhas, Brazil, July 15, 2024, Proceedings (Lecture Notes in Computer Science #14767)

by Foutse Khomh Gunel Jahangirova

This book constitutes the refereed proceedings of the 16th International Symposium on Search-Based Software Engineering, SSBSE 2024, held in Porto de Galinhas, Brazil, during July 2024. The 8 papers included in these proceedings were carefully reviewed and selected from 19 submissions. The papers deal with various aspects and applications of search-based software engineering, focusing on engineering challenges and the application of automated approaches and optimization techniques from AI and machine learning research.

Search: How the Data Explosion Makes Us Smarter

by Stefan Weitz

Search is as old as language. There has always been a need for one to find something in the jumble of human creation. The first web was nothing more than passing verbal histories down the generations so others could find and remember how not to get eaten; the first search used the power of written language to build simple indexes in printed books, leading to the Dewey Decimal system and reverse indices in more modern times. Then digital happened. Besides having profound societal impacts, it also made the act of searching almost impossibly complex for both engines and searchers. Information isn't just words; it is pictures, videos, thoughts tagged with geocode data, routes, physical world data, and, increasingly, the machines themselves reporting their condition and listening to others. Search: How the Data Explosion Makes Us Smarter holds up a mirror to our time to see if search can keep up. Author Stefan Weitz, Director of Search for Bing (Microsoft), explores the idea of access to help readers understand how we are inventing new ways to access data through devices in more places and with more capabilities. We are at the cusp of imbuing our generation with superpowers, but only if we fundamentally rethink what search is, how people can use it, and what we should demand of it.

Searchable Encryption: From Concepts to Systems (Wireless Networks)

by Cong Wang Kui Ren

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions.The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades.This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

Searchable Storage in Cloud Computing

by Yu Hua Xue Liu

This book presents the state-of-the-art work in terms of searchable storage in cloud computing. It introduces and presents new schemes for exploring and exploiting the searchable storage via cost-efficient semantic hashing computation. Specifically, the contents in this book include basic hashing structures (Bloom filters, locality sensitive hashing, cuckoo hashing), semantic storage systems, and searchable namespace, which support multiple applications, such as cloud backups, exact and approximate queries and image analytics. Readers would be interested in the searchable techniques due to the ease of use and simplicity. More importantly, all these mentioned structures and techniques have been really implemented to support real-world applications, some of which offer open-source codes for public use. Readers will obtain solid backgrounds, new insights and implementation experiences with basic knowledge in data structure and computer systems.

Searches: Selfhood in the Digital Age

by Vauhini Vara

From the author of The Immortal King Rao, finalist for the Pulitzer Prize, a personal exploration of how technology companies have both fulfilled and exploited the human desire for understanding and connectionA MOST ANTICIPATED BOOK: The New York Times, Esquire, Harper&’s Bazaar, Foreign Policy, Bustle, Alta, Ms. Magazine, Cultured, Denizen, Lit Hub, Book Riot, and Electric LiteratureWhen it was released to the public in November 2022, ChatGPT awakened the world to a secretive project: teaching AI-powered machines to write. Its creators had a sweeping ambition—to build machines that could not only communicate, but could do all kinds of other activities, better than humans ever could. But was this goal actually achievable? And if reached, would it lead to our liberation or our subjugation? Vauhini Vara, an award-winning tech journalist and editor, had long been grappling with these questions. In 2021, she asked a predecessor of ChatGPT to write about her sister&’s death, resulting in an essay that was both more moving and more disturbing than she could have imagined. It quickly went viral.The experience, revealing both the power and the danger of corporate-owned technologies, forced Vara to interrogate how these technologies have influenced her understanding of her self and the world around her, from discovering online chat rooms as a preteen, to using social media as the Wall Street Journal&’s first Facebook reporter, to asking ChatGPT for writing advice—while compelling her to add to the trove of human-created material exploited for corporations&’ financial gain. Interspersed throughout this investigation are her own Google searches, Amazon reviews, and the other raw material of internet life—including the viral AI experiment that started it all. Searches illuminates how technological capitalism is both shaping and exploiting human existence, while proposing that by harnessing the collective creativity that makes humans unique, we might imagine a freer, more empowered relationship with our machines and, ultimately, with one another.

Searching Speech Databases: Features, Techniques and Evaluation Measures (SpringerBriefs in Speech Technology)

by Leena Mary Deekshitha G

This book presents techniques for audio search, aimed to retrieve information from massive speech databases by using audio query words. The authors examine different features, techniques and evaluation measures attempted by researchers around the world. The topics covered also include available databases, software / tools, patents / copyrights, and different platforms for benchmarking. The content is relevant for developers, academics, and students.​

Searching for High-Frequency Trading Opportunities (Wiley Global Finance Executive Select #153)

by Irene Aldridge

Praise for High-Frequency Trading "A well thought out, practical guide covering all aspects of high-frequency trading and of systematic trading in general. I recommend this book highly." -Igor Tulchinsky, CEO, WorldQuant, LLC "For traditional fundamental and technical analysts, Irene Aldridge's book has the effect a first read of quantum physics would have had on traditional Newtonian physicists: eye-opening, challenging, and enlightening." -Neal M. Epstein, CFA, Managing Director, Research & Product Management, Proctor Investment Managers LLC Interest in high-frequency trading continues to grow, yet little has been published to help investors understand and implement high-frequency trading systems-until now. This book has everything you need to gain a firm grip on how high-frequency trading works and what it takes to apply this approach to your trading endeavors. Written by industry expert Irene Aldridge, High-Frequency Trading offers innovative insights into this dynamic discipline. Covering all aspects of high-frequency trading-from the formulation of ideas and the development of trading systems to application of capital and subsequent performance evaluation-this reliable resource will put you in a better position to excel in today's turbulent markets.

Searching for Trust: Blockchain Technology in an Age of Disinformation

by Victoria L. Lemieux

Searching for Trust explores the intersection of trust, disinformation, and blockchain technology in an age of heightened institutional and epistemic mistrust. It adopts a unique archival theoretic lens to delve into how computational information processing has gradually supplanted traditional record keeping, putting at risk a centuries-old tradition of the 'moral defense of the record' and replacing it with a dominant ethos of information-processing efficiency. The author argues that focusing on information-processing efficiency over the defense of records against manipulation and corruption (the ancient task of the recordkeeper) has contributed to a diminution of the trustworthiness of information and a rise of disinformation, with attendant destabilization of the epistemic trust fabric of societies. Readers are asked to consider the potential and limitations of blockchains as the technological embodiment of the moral defense of the record and as means to restoring societal trust in an age of disinformation.

Seasonal Sector Trades: 2014 Q1 Strategies

by John L. Person Jeffrey A. Hirsch

Commodity Trader's Almanac is now Seasonal Sector Trades! Strategies identifying the best-performing seasonal trades for the first quarter of 2014 Seasonal tendencies and cycles provide a foundation for profitable trading. This edition of Seasonal Sector Trades contains trade ideas and strategies for the first quarter (Q1) of 2014. It identifies the best trades for each month based on historic tendencies and cycles. A special report is issued covering stocks, bonds, currencies, energy, metals, grains, soft commodities, and meats. Concise and to-the-point, the report describes monthly price tendencies for each market, alerting you to major trading opportunities. An accompanying strategy calendar shows you what to monitor during the beginning, middle, and end of each month. In addition to this information, daily exits and entries are provided for trades with the best historic performance. Backstopping the trade ideas are articles on the major trades of the month and in-depth analysis on the historic price patterns of the underlying market. The trading ideas and data allow you to compare current market conditions against historic tendencies and make informed trading decisions along the way. Includes in-depth analysis and data of the seasonal tendencies of all major financial and commodity markets Details trading tips and strategies to maximize profits from suggested trades Based on years of proven historical data The culmination of years of painstaking research, this quarterly guide will provide you with the historic knowledge to spot big trades unfolding in today's markets.

Seasonal Sector Trades: 2014 Q2 Strategies

by John L. Person Jeffrey A. Hirsch

Commodity Trader's Almanac is now Seasonal Sector Trades! A precise seasonal investment strategy, backed by research and hard data Seasonal Sector Trades: 2014 Q2 Strategies is a comprehensive strategy calendar detailing the trades to evaluate at key points in April, May, and June, based on historic tendencies and cycles. Concise and to the point, this report alerts readers to major trade opportunities by describing monthly price tendencies for each market, along with in-depth analysis of major trades and the underlying market conditions. The trading ideas are accompanied by data that allows for informed trading decisions, and precise dates are given for trades with the highest historic profitability percentages. Virtually every market displays seasonal tendencies due to weather, harvest cycles, or even human behavior. None of these patterns are 100 percent accurate, but they do provide a framework for assessing opportunity and targeting potential trades. The culmination of years of painstaking research, Seasonal Sector Trades offers expert guidance backed by hard data. Readers will gain insight and actionable advice on the best trades of the season, covering stocks, bonds, currencies, energy, metals, grains, soft commodities, and meats. This report contains crucial information traders need to take advantage of seasonal trends, including features like: Historical tendencies for all markets throughout the calendar year Trades to monitor throughout each month Precise entry and exits for trades with the best performance Trading tips and strategies to maximize profits A complete seasonal investment strategy can take years to research and compile. Markets must be monitored and analyzed, and their behavior must be correlated with outside factors. Along the way, opportunities are missed and money is lost. This report contains the results of all that work in an already-complete format. With high-level analysis and specialist insight, Seasonal Sector Trades is the industry's most authoritative guide to the seasonal tendencies of every major market.

Second Generation Biometrics: The Ethical, Legal and Social Context

by Dimitros Tzovaras Emilio Mordini

While a sharp debate is emerging about whether conventional biometric technology offers society any significant advantages over other forms of identification, and whether it constitutes a threat to privacy, technology is rapidly progressing. Politicians and the public are still discussing fingerprinting and iris scan, while scientists and engineers are already testing futuristic solutions. Second generation biometrics - which include multimodal biometrics, behavioural biometrics, dynamic face recognition, EEG and ECG biometrics, remote iris recognition, and other, still more astonishing, applications - is a reality which promises to overturn any current ethical standard about human identification. Robots which recognise their masters, CCTV which detects intentions, voice responders which analyse emotions: these are only a few applications in progress to be developed. This book is the first ever published on ethical, social and privacy implications of second generation biometrics. Authors include both distinguished scientists in the biometric field and prominent ethical, privacy and social scholars. This makes this book an invaluable tool for policy makers, technologists, social scientists, privacy authorities involved in biometric policy setting. Moreover it is a precious instrument to update scholars from different disciplines who are interested in biometrics and its wider social, ethical and political implications.

Second Handbook of Information Technology in Primary and Secondary Education

by Joke Voogt Gerald Knezek Rhonda Christensen Kwok-Wing Lai

In this second edition the editors continue their efforts to synthesize research and practice and project future directions in the field of information and communication technology. The proliferation of mobile devices and applications have had major implications on how the nature of teaching and learning should be conceptualised, and what pedagogical practices should be used to support bridging formal and informal learning. The advent of social media also highlights the importance of gaining a deeper understanding of social learning theories and computer-supported collaborative learning theories and practices. The advancement of new technologies to support easy accessibility of educational resources such as OER and to a lesser extent MOOCs have led to the debate on how assessment should be conducted and how technologies could be used to support it. The demand of the knowledge society requires that researchers, policy makers, and educational practitioners be conversant with new research findings in order to understand the impact of ICT in teaching and learning, and how to support learners to use new technologies and applications creatively and effectively. New research paradigms have emerged to meet these challenges.

Second International Conference on Image Processing and Capsule Networks: ICIPCN 2021 (Lecture Notes in Networks and Systems #300)

by Ke-Lin Du João Manuel R. S. Tavares Joy Iong-Zong Chen Abdullah M. Iliyasu

This book includes the papers presented in 2nd International Conference on Image Processing and Capsule Networks [ICIPCN 2021]. In this digital era, image processing plays a significant role in wide range of real-time applications like sensing, automation, health care, industries etc. Today, with many technological advances, many state-of-the-art techniques are integrated with image processing domain to enhance its adaptiveness, reliability, accuracy and efficiency. With the advent of intelligent technologies like machine learning especially deep learning, the imaging system can make decisions more and more accurately. Moreover, the application of deep learning will also help to identify the hidden information in volumetric images. Nevertheless, capsule network, a type of deep neural network, is revolutionizing the image processing domain; it is still in a research and development phase. In this perspective, this book includes the state-of-the-art research works that integrate intelligent techniques with image processing models, and also, it reports the recent advancements in image processing techniques. Also, this book includes the novel tools and techniques for deploying real-time image processing applications.The chapters will briefly discuss about the intelligent image processing technologies, which leverage an authoritative and detailed representation by delivering an enhanced image and video recognition and adaptive processing mechanisms, which may clearly define the image and the family of image processing techniques and applications that are closely related to the humanistic way of thinking.

Second International Conference on Networks and Advances in Computational Technologies: NetACT 19 (Transactions on Computational Science and Computational Intelligence)

by Maurizio Palesi Ljiljana Trajkovic J. Jayakumari John Jose

This book presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19) which took place on July 23-25, 2019 at Mar Baselios College of Engineering and Technology in Thiruvananthapuram, India. The conference was in association with Bowie State University, USA, Gannon University, USA and Malardalen University, Sweden. Papers presented were included in technical programs that were part of five parallel tracks, namely Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning. The proceedings brings together experts from industry, governments and academia from around the world with vast experiences in design, engineering and research.Presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19);Includes research in Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning;Provides perspectives from industry, academia and government.

Second International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2021 (Advances in Intelligent Systems and Computing #1235)

by Xiao-Zhi Gao Ashish Kumar Luhach Dharm Singh Jat Ramesh Chandra Poonia

This book gathers high-quality papers presented at the Second International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2021) held at Graphic Era University, Dehradun, India, during May 22–23, 2021. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.

Second International Handbook of Science Education

by Campbell J. Mcrobbie Barry J. Fraser Kenneth Tobin

The International Handbook of Science Education is a two volume edition pertaining to the most significant issues in science education. It is a follow-up to the first Handbook, published in 1998, which is seen as the most authoritative resource ever produced in science education. The chapters in this edition are reviews of research in science education and retain the strong international flavor of the project. It covers the diverse theories and methods that have been a foundation for science education and continue to characterize this field. Each section contains a lead chapter that provides an overview and synthesis of the field and related chapters that provide a narrower focus on research and current thinking on the key issues in that field. Leading researchers from around the world have participated as authors and consultants to produce a resource that is comprehensive, detailed and up to date. The chapters provide the most recent and advanced thinking in science education making the Handbook again the most authoritative resource in science education.

Second Life For Dummies

by Sarah Robbins Mark Bell

You've heard all about Second Life. Maybe you've already jumped with both feet--and gotten stuck. Or maybe you're a Second Life veteran who wants to build something or run a business. Fear not! Second Life For Dummies is hear to hold your hand, pat your back, and cheer you on through this new and enchanting reality.Written by a pair of Second Life old timers, this easy-to-use, flip-and-find guide is packed with expert advice, seasoned insight, and handy tips and tricks to get you moving fast. You'll find out how to set up your account, create an avatar, meet people and socialize, and find your comfort zone and stay in it. But it's a big world out there, so you'll also learn how to make stuff, buy stuff, do stuff, and keep track of all the stuff you're accumulating. Discover how toInstall Second Life get startedCreate and customize your avatarMeet and get to know fascinating peopleStay safe and comfortable as you learn and exploreMake, wear, and sell your own fashionsScript your Second LifeBuy land and build a houseBecome a land baron or a money makerMake real money in Second LifeGet a real-life education--even a degreeComplete with fantastic lists of cool places, answers to big questions, and supplemental software, Second Life For Dummies is your ticket to a great virtual adventure.

Second Life as a Virtual Playground for Language Education: A Practical Guide for Teaching and Research

by Julian Chen

This insightful book offers language teachers and teachers in training the opportunity to delve into 3D virtual worlds and see the benefits they provide for effective language teaching. Based on a decade of experience teaching and researching in Second Life (SL), Chen demystifies the dos and don’ts of SL teaching and research, whilst vividly walking readers through each step of the journey. Written in an accessible, jargon-free, and personalised tone, the book is divided into three parts. Part I builds the foundation in SL research, task-based language teaching (TBLT), and understanding fundamental skills for SL teaching. Part II showcases the author’s SL teaching blog that generously unveils their task-based, SL-enabled lessons, participant observations, critical reflections, and lessons learned from each SL session. Part III is complete with the highlights of the author’s SL research and hands-on resources and tips for readers. Each chapter also features a "Checkpoint" section to gauge reader understanding of chapter content, followed by a "Your Task" section to promote learning by doing in SL. Teachers and curriculum designers will find the well-detailed and guided lesson planning useful when starting their first SL class. Graduate students and novice researchers will also find the systematically recorded data collection helpful for their SL research.

Second Lives: A Journey Through Virtual Worlds

by Tim Guest

We've always dreamed of perfect places: Eden, heaven, Oz Â- places over the rainbow, beyond death and loss. Now, through computer technology, we can inhabit those worlds together. Each week, between 35 and 50 million people worldwide abandon reality for virtual worlds. In Boston, Massachusetts, a group of nine disabled men and women inhabit one virtual body, which frees them from their lifelong struggle to be seen and heard. The Pentagon has begun to develop virtual worlds to help in real-world battles. In Korea, where one particular game has 8 million residents, virtual violence has spread into the real world. Fortunes have been made, and mafia gangs have emerged to muscle in on the profits. In these new computer-generated places, which at first glance seem free from trouble and sorrow, you can create a new self. With the click of a mouse you can select eye colour, face shape, height, even wings. You can build houses, make and sell works of art, earn real money, get married and divorced. On websites like eBay, people sell virtual clothes and rent virtual property for real cash - for a total of £400 million worth each year. Tim Guest takes us on a revelatory journey through the electronic looking-glass, as he investigates one of the most bizarre phenomena of the 21st century.

Second Time Around: From Art House to DVD

by D. A. Miller

The art houses and cinema clubs of his youth are gone, but the films that D. A. Miller discovered there in the 1960s and ’70s are now at his fingertips. With DVDs and streaming media, technology has turned the old cinematheque’s theatrical offerings into private viewings that anyone can repeat, pause, slow, and otherwise manipulate at will.In Second Time Around, Miller seizes this opportunity; across thirteen essays, he watches digitally restored films by directors from Mizoguchi to Pasolini and from Hitchcock to Honda, looking to find not only what he first saw in them but also what he was then kept from seeing by quick camerawork, normal projection speed, missing frames, or simple censorship. At last he has an unobstructed view of the gay leather scene in Cruising, the expurgated special effects in The H-Man, and the alternative ending to Vertigo. Now he can pursue the finer details of Chabrol’s debt to Hitchcock, Visconti’s mystificatory Marxism, or the unemotive emotion in Godard.Yet this recaptured past is strangely disturbing; the films and the author have changed in too many ways for their reunion to be like old times. The closeness of Miller’s attention clarifies the painful contradictions of youth and decline, damaged prints and flawless restorations.

Secondary Liability of Internet Service Providers

by Graeme B. Dinwoodie

This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.

Secrecy, Covertness and Authentication in Wireless Communications: Physical Layer Security Approach (Wireless Networks)

by Xiaohong Jiang Yulong Shen Yuanyu Zhang

This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques.This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.

Secret Coders: Monsters & Modules (Secret Coders #6)

by Gene Luen Yang

From graphic novel superstar (and former computer programming teacher) and New York Times bestselling author Gene Luen Yang, Secret Coders: Monsters & Modules is the sixth and final volume in a wildly entertaining series that combines logic puzzles and basic coding instruction with a page-turning mystery plot!The Coders always knew their programming skills would take them far, but they never guessed they would take them to another dimension! Or to be accurate, one dimension less—to save humanity, Hopper, Eni, and Josh must travel to Flatland, a dangerous two-dimensional world ruled by polygons. If they can return home safely with a turtle of light, they might just stand a chance in their final showdown with Dr. One-Zero!

Secret Coders: Potions & Parameters (Secret Coders #5)

by Gene Luen Yang

From graphic novel superstar (and former computer programming teacher) and New York Times bestselling author Gene Luen Yang, Secret Coders: Potions & Parameters is the fifth volume in a wildly entertaining series that combines logic puzzles and basic coding instruction with a page-turning mystery plot!Dr. One-Zero won't stop until the whole town—no, the whole world—embraces the "true happiness” found in his poisonous potion, Green Pop. And now that he has the Turtle of Light, he’s virtually unstoppable.There's one weapon that can defeat him: another Turtle of Light. Unfortunately, they can only be found in another dimension! To open a portal to this new world, Hopper, Eni, and Josh's coding skills will be put to the test.

Secret Coders: Robots & Repeats (Secret Coders #4)

by Gene Luen Yang

Dr. One-Zero has added a new class to Stately Academy's curriculum. But in "Advanced Chemistry," they only teach one lesson: how to make Green Pop! While their classmates are manufacturing this dangerous soda, the Coders uncover a clue that may lead them to Hopper's missing dad. Is it time to use Professor Bee's most powerful weapon: the Turtle of Light?From graphic novel superstar (and former computer-programming teacher) Gene Luen Yang, comes Robots & Repeats, the fourth volume of Secret Coders. This wildly entertaining series combines logic puzzles and basic coding instruction with a page-turning mystery plot!

Refine Search

Showing 49,151 through 49,175 of 61,568 results