{"id":1510,"date":"2011-08-10T22:27:11","date_gmt":"2011-08-10T22:27:11","guid":{"rendered":"http:\/\/www.asc-cybernetics.org\/2011\/?p=1510"},"modified":"2011-08-10T22:27:11","modified_gmt":"2011-08-10T22:27:11","slug":"conference-booklets","status":"publish","type":"post","link":"https:\/\/www.asc-cybernetics.org\/2011\/?p=1510","title":{"rendered":"Conference Booklets"},"content":{"rendered":"<p>The ASC2011 conference booklets were prepared by Christiane M. Herr, produced with generous support by <a href=\"http:\/\/www.iue.edu\/\" target=\"_new\">Indiana University East<\/a> and handed out at the conference registration desk. A PDF version (4MB) can be downloaded <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/08\/conference_booklet.pdf\">here<\/a>.<\/p>\n<div id=\"attachment_1509\" class=\"wp-caption aligncenter\" style=\"width: 436px\"><a href=\"http:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/08\/booklets.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/08\/booklets.jpg\" alt=\"ASC2011 Conference Booklets\" title=\"ASC2011 Conference Booklets\" width=\"426\" height=\"273\" class=\"size-full wp-image-1509\" srcset=\"https:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/08\/booklets.jpg 426w, https:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/08\/booklets-300x192.jpg 300w\" sizes=\"auto, (max-width: 426px) 100vw, 426px\" \/><\/a><p class=\"wp-caption-text\">ASC2011 Conference Booklets<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The ASC2011 conference booklets were prepared by Christiane M. Herr, produced with generous support by Indiana University East and handed out at the conference registration desk. A PDF version (4MB) can be downloaded here.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1510","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/posts\/1510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1510"}],"version-history":[{"count":2,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/posts\/1510\/revisions"}],"predecessor-version":[{"id":1512,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/posts\/1510\/revisions\/1512"}],"wp:attachment":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}