11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index 575Representational State Transfer(REST) 509reputation systems 480–481research, online. See onlineresearchresearch laboratories in computing403–404. See also specificlaboratoriesResearch Library InformationNetwork (RLIN) 275resistive touchscreen 478resource consumption, <strong>of</strong>computers 216resource data type 373Resource Description Format(RDF) 424resource lock 113resource management 151, 389REST (Representational StateTransfer) 509retina scanning 48retirement planning 195reverse engineering 4, 404–405Reynolds, Craig 28RFID (radio frequencyidentification) 384, 405–407,406, 436RGB 93, 371Rhapsody 326Rheingold, Howard 198, 407–408,493Rheingold Associates 407RIAA (Recording IndustryAssociation <strong>of</strong> America) 125,150, 246Rich Text Format (RTF) 135, 413RIGHT SHIFT bitwise operator 52Riley, Bridget 25RIM BlackBerry 220, 364, 437Ringley, Jennifer 504RIP (Raster Image Processor) 379RISC (reduced instruction setcomputer) 261, 288, 305, 320,401–402Rise <strong>of</strong> the Expert Company, The(Feigenbaum) 190risks <strong>of</strong> computing 408–409, 438Ritchie, Dennis 65, 409, 409–410,429, 485River, The 114Rivest, Ron 146, 181RLE (run-length encoding) 214RLIN (Research LibraryInformation Network) 275Roadrunner 462Roberts, Lawrence G. 145, 266RoboHelp 225robotics 410–412academic credentials for 79artificial intelligence in 27in artificial life 28artificial limbs <strong>and</strong> 335–336in assistive technologies 425Breazeal’s work in 56–57Brooks’s work in 59–60in CAM 98computer science in 110computer vision in 112cybernetics in 124finite state machines in 196frames used in 313genetic algorithms in 208haptic interfaces in 222industrial use <strong>of</strong> 182–183in law enforcement 273“laws” <strong>of</strong> 418, 433layered architecture for 59military use <strong>of</strong> 311Minsky’s work in 313natural language processingin 330neural networks in 337personal robots 314research institutions in 403risk <strong>and</strong> 408in science fiction 418social impact <strong>of</strong> 439in space exploration 449for telepresence 474–475Robotics in Practice (Engelberger)183Robotics in Service (Engelberger)183Robot Wars 410Rock, Andrew 318Rockefeller Differential Analyzer(RDA2) 63RoCo (robot) 57role-playing games 104, 237, 347Rollins, Kevin B. 140ROM (Read-Only Memory) 301Roomba (robot) 60, 253root, <strong>of</strong> tree 138rootkit 150, 446root status 136Rosenblatt, Frank 313, 336Rosenbleuth, Arturo 510–511routers 87, 197routines 45, 49, 197–198, 200,207, 296royalties, for Internet radio 251RPC (remote procedure call) 154,309, 438, 509RPG (Report Program Generator)412R. R. Donnelly 292RSA algorithm 146, 181RSIs (repetitive stress injuries)185, 265RSS (Really Simple Syndication)375, 412–413RTF (Rich Text Format) 135, 413RTS (real-time simulations) 104,311Ruby 413–414Ruby on Rails 414ruggedized laptops 273rules 188, 204, 270, 271run-length encoding (RLE) 214run-time errors 186R.U.R. (Čapek) 410, 418Rural Free Delivery 153SSABRE 404SAC (Strategic Air Comm<strong>and</strong>) 311Safari 504SAGE (Strategic Air GroundEnvironment) 104, 139, 212,235, 311SageTV 299SAIL (Stanford ArtificialIntelligence Laboratory) 59,145, 403sales applications 64Salesforce.com 21salon.com 259SAM (s<strong>of</strong>tware asset management)244Samba 405sampling, in computer vision 112sampling rate 130, 399–400SAN (storage area network) 192,335s<strong>and</strong>box 255Sanger, Larry 500sans serif fonts 201SAP 293, 415–416, 462SAP Business ByDesign 415SATA (serial IDE) 223satellite communications network320satellite Internet service 58, 416SAX (Simple API for SML) 161Scalia, Antonin 274scams, online 100, 344, 345–346,349, 472. See also identity theftscanner 12–13, 48, 268, 342, 355,416–417scheduling <strong>and</strong> prioritization 389,417–418schema. See framesScheme 281Schickard, Wilhelm 70Schmidt, Eric 358Schmitt, William 297Schockley Semiconductor Labs 318Scholastic Aptitude Test (SAT) 71school shootings 126science fiction <strong>and</strong> computing 220,335, 410, 411, 418–419Scientific Atlanta 87scientific computing applications27, 110, 130, 136, 419–421, 420,431–432. See also FORTRANscientific instrumentation 419–420scientific modeling 106. See alsosimulationScooba (robot) 253scope, <strong>of</strong> variables 491Scottrade 348screen savers 203scripting languages 421–422.See also awk; JavaScript; Lua;Perl; PHP; Python; Ruby; Tcl;VBScriptfor administrative tasks 464in Ajax 5–6applets <strong>and</strong> 19in ASP 1in authoring systems 32for CGI 80–81computer science in 110for database development132with DHTML 233in DOM 161for Internet applicationsprogramming 249Java <strong>and</strong> 256regular expressions in 402in shell 428, 429–430in s<strong>of</strong>tware installation 244in text editor 476in UNIX 485–486Web servers <strong>and</strong> 508scriptwriting 194SCSI (Small <strong>Computer</strong> SystemsInterface) 63, 197, 223, 335Sculley, John 258SDRAM (synchronous DRAM) 301search engine 422–424, 423.See also Google; informationretrievalAjax pages <strong>and</strong> 6Boolean operators in 54in computing history 229in cyberstalking 126for information retrieval241, 241in Internet growth 248knowledge representationin 267Micros<strong>of</strong>t research in 306natural language processingin 330in online advertising 344for online research 350portals <strong>and</strong> 379Semantic web <strong>and</strong> 424searching 109, 240–241, 401, 402,446–448“Search Inside the Book” 9Searle, John 93Seattle <strong>Computer</strong> Products 321Second Life 347, 347–348as computer game 104cyberlaw <strong>and</strong> 124distance education in 154study <strong>of</strong> 391, 441–442virtual community <strong>of</strong> 494Second Self, The (Turkle) 482sector interleaving 222sectors 222Secure Digital (SD) memory card198secure shell (ssh) 248Secure Sockets Layer (SSL) 79, 503security 100–101. See alsocomputer crime; data securityauditing <strong>and</strong> 31banking <strong>and</strong> 39buffer overflows <strong>and</strong> 60cable modems <strong>and</strong> 69cookies <strong>and</strong> 116<strong>of</strong> credit card transactions146digital certificates <strong>and</strong> 78–79in e-commerce 168e-mail <strong>and</strong> 177employment in 178, 179forensics in 102–103in information warfare 242Internet growth <strong>and</strong> 248JavaScript <strong>and</strong> 256<strong>of</strong> mainframes 290–291in Micros<strong>of</strong>t Windows 309in military systems 311Mitnick <strong>and</strong> 314NAT <strong>and</strong> 469networks <strong>and</strong> 334, 450in operating systems 354outsourcing <strong>of</strong> 108risk <strong>and</strong> 408system administrators <strong>and</strong>464telnet <strong>and</strong> 248<strong>of</strong> voting systems 176<strong>of</strong> Web servers 508on wireless networks 513security patches 111sed 365seed 399Sega 205SEI (S<strong>of</strong>tware EngineeringInstitute) 444selection sort 446–447selection statements. See branchingstatementsSelectric typewriter 516self 369self-replicating computers 329semantic analysis 96, 96semantics 270semantic Web 424Berners-Lee <strong>and</strong> 44in counterterrorism 118for information retrieval 241knowledge representationin 267ontologies in 351, 369technological singularity<strong>and</strong> 433Web 2.0 <strong>and</strong> 503semaphore 113, 151semiconductors 85, 318semipassive RFID 405sendmail 60, 111, 177senior citizens <strong>and</strong> computing424–425, 434sensors 178, 178, 208, 496September 11, 2001, attacks 53,383, 439sequential access 192

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!