View topic on PhilPapers for more information
Related categories

12 found
Order:
More results on PhilPapers
  1. Layers of Models in Computer Simulations.Thomas Boyer-Kassem - 2014 - International Studies in the Philosophy of Science 28 (4):417-436.
    I discuss here the definition of computer simulations, and more specifically the views of Humphreys, who considers that an object is simulated when a computer provides a solution to a computational model, which in turn represents the object of interest. I argue that Humphreys's concepts are not able to analyse fully successfully a case of contemporary simulation in physics, which is more complex than the examples considered so far in the philosophical literature. I therefore modify Humphreys's definition of simulation. I (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  2. The Case for Continuous Auditing of Management Information Systems.Robert E. Davis - 2012 - Effective Auditing for Corporates: Key Developments in Practice and Procedures (Key Concepts).
    In the wake of the recent financial crisis, increasing the effectiveness of auditing has weighed heavily on the minds of those responsible for governance. When a business is profitable and paying healthy dividends to its stockholders, fraudulent activities and accounting irregularities can go unnoticed. However, when revenue and cash flow decline, internal costs and operations may be scrutinized more diligently, and discrepancies can emerge as a result. Effective Auditing for Corporates provides you with proactive advice to ...
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  3. Physical Computation: A Mechanistic Account. [REVIEW]Joe Dewhurst - 2016 - Philosophical Psychology 29 (5):795-797.
    Physical Computation is the summation of Piccinini’s work on computation and mechanistic explanation over the past decade. It draws together material from papers published during that time, but also provides additional clarifications and restructuring that make this the definitive presentation of his mechanistic account of physical computation. This review will first give a brief summary of the account that Piccinini defends, followed by a chapter-by-chapter overview of the book, before finally discussing one aspect of the account in more critical detail.
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  4. Opinions and Outlooks on Morphological Computation.Helmut Hauser, Rudolf M. Füchslin & Rolf Pfeifer (eds.) - 2014 - E-Book.
    Morphological Computation is based on the observation that biological systems seem to carry out relevant computations with their morphology (physical body) in order to successfully interact with their environments. This can be observed in a whole range of systems and at many different scales. It has been studied in animals – e.g., while running, the functionality of coping with impact and slight unevenness in the ground is "delivered" by the shape of the legs and the damped elasticity of the muscle-tendon (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  5. Simple or Complex Bodies? Trade-Offs in Exploiting Body Morphology for Control.Matej Hoffmann & Vincent C. Müller - 2017 - In Gordana Dodig-Crnkovic & Raffaela Giovagnoli (eds.), Representation of Reality: Humans, Other Living Organisms and Intelligent Machines. Berlin: Springer. pp. 335-345.
    Engineers fine-tune the design of robot bodies for control purposes, however, a methodology or set of tools is largely absent, and optimization of morphology (shape, material properties of robot bodies, etc.) is lagging behind the development of controllers. This has become even more prominent with the advent of compliant, deformable or ”soft” bodies. These carry substantial potential regarding their exploitation for control—sometimes referred to as ”morphological computation”. In this article, we briefly review different notions of computation by physical systems and (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  6. A User Profiling Component with the Aid of User Ontologies.Nébel István-Tibor, Barry Smith & Paschke Ralf - 2003 - In Learning – Teaching – Knowledge – Adaptivity (LLWA), University of Karlsruhe (2003). Karlsruhe, Germany:
    Abstract: What follows is a contribution to the field of user modeling for adaptive teaching and learning programs especially in the medical field. The paper outlines existing approaches to the problem of extracting user information in a form that can be exploited by adaptive software. We focus initially on the so-called stereotyping method, which allocates users into classes adaptively, reflecting characteristics such as physical data, social background, and computer experience. The user classifications of the stereotyping method are however ad hoc (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  7. Justified Belief in a Digital Age: On the Epistemic Implications of Secret Internet Technologies.Boaz Miller & Isaac Record - 2013 - Episteme 10 (2):117 - 134.
    People increasingly form beliefs based on information gained from automatically filtered Internet ‎sources such as search engines. However, the workings of such sources are often opaque, preventing ‎subjects from knowing whether the information provided is biased or incomplete. Users’ reliance on ‎Internet technologies whose modes of operation are concealed from them raises serious concerns about ‎the justificatory status of the beliefs they end up forming. Yet it is unclear how to address these concerns ‎within standard theories of knowledge and justification. (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography   6 citations  
  8. Computational Mechanisms and Models of Computation.Marcin Miłkowski - 2014 - Philosophia Scientae 18:215-228.
    In most accounts of realization of computational processes by physical mechanisms, it is presupposed that there is one-to-one correspondence between the causally active states of the physical process and the states of the computation. Yet such proposals either stipulate that only one model of computation is implemented, or they do not reflect upon the variety of models that could be implemented physically. In this paper, I claim that mechanistic accounts of computation should allow for a broad variation of models of (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  9. Computing and Philosophy: Selected Papers From IACAP 2014.Vincent C. Müller (ed.) - 2016 - Springer.
    This volume offers very selected papers from the 2014 conference of the “International Association for Computing and Philosophy” (IACAP) - a conference tradition of 28 years. - - - Table of Contents - 0 Vincent C. Müller: - Editorial - 1) Philosophy of computing - 1 Çem Bozsahin: - What is a computational constraint? - 2 Joe Dewhurst: - Computing Mechanisms and Autopoietic Systems - 3 Vincenzo Fano, Pierluigi Graziani, Roberto Macrelli and Gino Tarozzi: - Are Gandy Machines really local? (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  10. What is Morphological Computation? On How the Body Contributes to Cognition and Control.Vincent C. Müller & Matej Hoffmann - 2017 - Artificial Life 23 (1):1-24.
    The contribution of the body to cognition and control in natural and artificial agents is increasingly described as “off-loading computation from the brain to the body”, where the body is said to perform “morphological computation”. Our investigation of four characteristic cases of morphological computation in animals and robots shows that the ‘off-loading’ perspective is misleading. Actually, the contribution of body morphology to cognition and control is rarely computational, in any useful sense of the word. We thus distinguish (1) morphology that (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  11. DDoS Protection With IPtables.Constantin Oesterling - 2016 - InfoSec:15.
    Research on the most effective Linux iptables rules to mitigate Distributed Denial of Service (DDoS) attacks.
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography  
  12. Chains of Reference in Computer Simulations.Franck Varenne - 2013 - FMSH Working Papers 51:1-32.
    This paper proposes an extensionalist analysis of computer simulations (CSs). It puts the emphasis not on languages nor on models, but on symbols, on their extensions, and on their various ways of referring. It shows that chains of reference of symbols in CSs are multiple and of different kinds. As they are distinct and diverse, these chains enable different kinds of remoteness of reference and different kinds of validation for CSs. Although some methodological papers have already underlined the role of (...)
    Remove from this list   Download  
     
    Export citation  
     
    My bibliography   1 citation