Related

Contents
24 found
Order:
  1. Halting problem proofs refuted on the basis of software engineering ?P. Olcott - manuscript
    This is an explanation of a possible new insight into the halting problem provided in the language of software engineering. Technical computer science terms are explained using software engineering terms. No knowledge of the halting problem is required. -/- It is based on fully operational software executed in the x86utm operating system. The x86utm operating system (based on an excellent open source x86 emulator) was created to study the details of the halting problem proof counter-examples at the much higher level (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. STATE POWER VERSUS WILLINGNESS (THIS IS THE HEADLINES).Thobias Sarbunan - 2022 - IEEE DATA PORT.
    This article created to address the current state of affairs, which has resulted in an insufficient progress and innovation system. The purpose of this overview article is to increase educate society's knowledge of how to use modern and innovative technologies based on need, cultural aspects, social context, and state context. As a result, I used secondary sources to assist readers understand how state actors and policies might best respond to society's aspirations to use and communicate through technology and information, as (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. Game Technologies to Assist Learning of Communication Skills in Dialogic Settings for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2021 - International Journal of Emerging Technologies in Learning 16 (3):190-205.
    Persons with aphasia suffer from a loss of communication ability as a consequence of a brain injury. A small strand of research indicates effec- tiveness of dialogic interventions for communication development for persons with aphasia, but a vast amount of research studies shows its effectiveness for other target groups. In this paper, we describe the main parts of the hitherto technological development of an application named Dialogica that is (i) aimed at facilitating increased communicative participation in dialogic settings for persons (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked in accounts (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in detail the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Ciencia de la computación y filosofía: unidades de análisis del software.Juan Manuel Durán - 2018 - Principia 22 (2):203-227.
    Una imagen muy generalizada a la hora de entender el software de computador es la que lo representa como una “caja negra”: no importa realmente saber qué partes lo componen internamente, sino qué resultados se obtienen de él según ciertos valores de entrada. Al hacer esto, muchos problemas filosóficos son ocultados, negados o simplemente mal entendidos. Este artículo discute tres unidades de análisis del software de computador, esto es, las especificaciones, los algoritmos y los procesos computacionales. El objetivo central es (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Coordination technology for active support networks: context, needfinding, and design.Stanley J. Rosenschein & Todd Davies - 2018 - AI and Society 33 (1):113-123.
    Coordination is a key problem for addressing goal–action gaps in many human endeavors. We define interpersonal coordination as a type of communicative action characterized by low interpersonal belief and goal conflict. Such situations are particularly well described as having collectively “intelligent”, “common good” solutions, viz., ones that almost everyone would agree constitute social improvements. Coordination is useful across the spectrum of interpersonal communication—from isolated individuals to organizational teams. Much attention has been paid to coordination in teams and organizations. In this (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the discovery of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small applications and resources (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand by instantiation. Several software process modeling/meta-modeling languages (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A negative malfunction, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   28 citations  
  14. Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies.Todd Davies - 2014 - In Luca Maria Aiello & Daniel McFarland (eds.), Social Informatics: Proceedings of the 6th International Conference (SocInfo 2014). Springer Lecture Notes in Computer Science Vol. 8851. pp. 428-443.
    Interest has been revived in the creation of a "bill of rights" for Internet users. This paper analyzes users' rights into ten broad principles, as a basis for assessing what users regard as important and for comparing different multi-issue Internet policy proposals. Stability of the principles is demonstrated in an experimental survey, which also shows that freedoms of users to participate in the design and coding of platforms appear to be viewed as inessential relative to other rights. An analysis of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  15. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected from (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  16. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Using Argument Diagramming Software in the Classroom.Maralee Harrell - 2005 - Teaching Philosophy 28 (2):163-177.
    Many undergraduates, philosophy majors included, read philosophical texts similar to the way they read stories. One method for teaching students how to discern the argumentative structure of a philosophy text is through argument diagrams (text boxes used to represent claims with arrows and lines used to represent connections between these claims). This paper provides criteria for an ideal argument diagramming software and then reviews the strengths and weaknesses of such software currently available, e.g. Araucaria, Argutect, Athena Standard, Inspiration, and Reason!Able.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   9 citations  
  18. The Structure and Logic of Interdisciplinary Research in Agent-Based Social Simulation.Nuno David, Maria Marietto, Jaime Sichman & Helder Coelho - 2004 - Journal of Artificial Societies and Social Simulation 7 (3).
    This article reports an exploratory survey of the structure of interdisciplinary research in Agent-Based Social Simulation. One hundred and ninety six researchers participated in the survey completing an on-line questionnaire. The questionnaire had three distinct sections, a classification of research domains, a classification of models, and an inquiry into software requirements for designing simulation platforms. The survey results allowed us to disambiguate the variety of scientific goals and modus operandi of researchers with a reasonable level of detail, and to identify (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   17 citations  
  20. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining corporate interest. As (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. How do we read a dictionary (as machines and as humans)? Kinds of information in dictionaries constructed and reconstructed.Vincent C. Müller - 2000 - In Evangelos Dermatas (ed.), Proceedings of COMLEX2000: Computational lexicography. Patras University Press. pp. 141-144.
    Two large lexicological projects for the Center for the Greek Language, Thessaloniki, were to be published in print and on the WWW, which meant that two conversions were needed: a near-database file had to be converted to fully formatted file for printing and a fully formatted file had to be converted to a database for WWW access. As it turned out, both conversions could make use of existing clues that indicated the kinds of information contained in each particular piece of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. A Dynamic Software Certification and Verification Procedure.Julio Michael Stern & Carlos Alberto de Braganca Pereira - 1998 - SCI’99 Proceedings 2:426-435.
    in Oct-14-1998 ordinance INDESP-IO4 established the federal software certification and verification requirements for gaming machines in Brazil. The authors present the rationale behind these criteria, whose basic principles can find applications in several other software authentication applications.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  23. The mind as the software of the brain.Ned Block - 1995 - In Daniel N. Osherson, Lila Gleitman, Stephen M. Kosslyn, S. Smith & Saadya Sternberg (eds.), An Invitation to Cognitive Science, Second Edition, Volume 3. Cambridge MA: MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   59 citations  
  24. Automated Theorem Proving and Its Prospects. [REVIEW]Desmond Fearnley-Sander - 1995 - PSYCHE: An Interdisciplinary Journal of Research On Consciousness 2.
    REVIEW OF: Automated Development of Fundamental Mathematical Theories by Art Quaife. (1992: Kluwer Academic Publishers) 271pp. Using the theorem prover OTTER Art Quaife has proved four hundred theorems of von Neumann-Bernays-Gödel set theory; twelve hundred theorems and definitions of elementary number theory; dozens of Euclidean geometry theorems; and Gödel's incompleteness theorems. It is an impressive achievement. To gauge its significance and to see what prospects it offers this review looks closely at the book and the proofs it presents.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark