Results for ' Cloud Access'

977 found
Order:
  1. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  51
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons intelligent, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  8. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Empirically-Informed Modal Rationalism.Tuomas Tahko - 2016 - In Bob Fischer & Felipe Leon (eds.), Modal Epistemology After Rationalism. Cham: Springer. pp. 29-45.
    In this chapter, it is suggested that our epistemic access to metaphysical modality generally involves rationalist, a priori elements. However, these a priori elements are much more subtle than ‘traditional’ modal rationalism assumes. In fact, some might even question the ‘apriority’ of these elements, but I should stress that I consider a priori and a posteriori elements especially in our modal inquiry to be so deeply intertwined that it is not easy to tell them apart. Supposed metaphysically necessary identity (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  15. Consciousness as information system of the human body.Florin Gaiseanu - 2016 - Physics of Consciousness and Life 1 (1):14-25.
    Starting from the observation of the binary character YES/NOT of our decisions in relation to the information received from the environment, determining both our life and specie evolution by adaptation, it is defined the info-creational field and thought as an information operator on this field, allowing to describe the individual EGO as a receiver and producer information system, based on an operational and a programmed informational subsystem. Consciousness appears thus be an integrated information system which allows the adaptation to the (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  16. Believing for a Reason is (at least) Nearly Self-Intimating.Sophie Keeling - 2022 - Erkenntnis.
    This paper concerns a specific epistemic feature of believing for a reason (e.g., believing that it will rain on the basis of the grey clouds outside). It has commonly been assumed that our access to such facts about ourselves is akin in all relevant respects to our access to why other people hold their beliefs. Further, discussion of self-intimation - that we are necessarily in a position to know when we are in certain conditions - has centred largely (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  19. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a quantifiable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  79
    SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  22.  88
    EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then, (...) desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability. Finally, big data architecture and security issues of oil and gas industry are analyzed. Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability. This paper also provides a brief description for the future development of Cloud computing and big data in oil and gas industry. Cloud computing and big data can provide convenient information sharing and high quality service for oil and gas industry. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  74
    AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Reflective Access, Closure, and Epistemological Disjunctivism.Giada Fratantonio - 2019 - Episteme 1 (online first view):1-21.
    In this paper, I consider the so-called Access Problem for Duncan Pritchard’s Epistemological Disjunctivism (2012). After reconstructing Pritchard’s own response to the Access Problem, I argue that in order to assess whether Pritchard’s response is a satisfying one, we first need an account of the notion of ‘Reflective Access’ that underpins Pritchard’s Epistemological Disjunctivism. I provide three interpretations of the notion of Reflective Access: a metaphysical interpretation, a folk interpretation, and an epistemic interpretation. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Privileged access without luminosity.Giovanni Merlo - forthcoming - In Giovanni Merlo, Giacomo Melis & Crispin Wright (eds.), Self-knowledge and Knowledge A Priori. Oxford University Press.
    Williamson’s anti-luminosity argument has been thought to be in tension with the doctrine that we enjoy privileged epistemic access to our own mental states. In this paper, I will argue that the tension is only apparent. Friends of privileged access who accept the conclusion of the argument need not give up the claim that our beliefs about our own mental states are mostly or invariably right, nor the view that mental states are epistemically available to us in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Accessibility, pluralism, and honesty: a defense of the accessibility requirement in public justification.Baldwin Wong - 2022 - Critical Review of International Social and Political Philosophy 25 (2):235-259.
    Political liberals assume an accessibility requirement, which means that, for ensuring civic respect and non-manipulation, public officials should offer accessible reasons during political advocacy. Recently, critics have offered two arguments to show that the accessibility requirement is unnecessary. The first is the pluralism argument: Given the pluralism in evaluative standards, when officials offer non-accessible reasons, they are not disrespectful because they may merely try to reveal their strongest reason. The second is the honesty argument: As long as officials honestly confess (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  94
    Compensatory Preliminary Damages: Access to Justice as Corrective Justice.Sayid Bnefsi - 2024 - CUNY Law Review 27 (1):70-116.
    The access-to-justice movement broadly concerns the extent to which people have the ability to resolve legally actionable problems. To the extent that individuals seek resolution through civil litigation, they can be disadvantaged by their unmet need for legal services, particularly in high-stakes cases and complicated areas of law. In part, this is because legal services and litigation are cost-prohibitive, especially for indigent plaintiffs. As a result, these individuals are priced out of litigation and, by extension, unable to use law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by organize properties amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Faces in the Clouds: A New Theory of Religion.Stewart Guthrie - 1993 - New York and Oxford: Oup Usa.
    Guthrie contends that religion can best be understood as systematic anthropomorphism - the attribution of human characteristics to nonhuman things and events. Religion, he says, consists of seeing the world as human like. He offers a fascinating array of examples to show how this strategy pervades secular life and how it characterizes religious experience.
    Download  
     
    Export citation  
     
    Bookmark   162 citations  
  32. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Contextualism, Moral Disagreement, and Proposition Clouds.Jussi Suikkanen - 2019 - In Russ Shafer-Landau (ed.), Oxford Studies in Metaethics Volume 14. Oxford Studies in Metaethics. pp. 47-69.
    According to contextualist theories in metaethics, when you use a moral term in a context, the context plays an ineliminable part in determining what natural property will be the semantic value of the term. Furthermore, on subjectivist and relativist versions of these views, it is either the speaker's own moral code or her moral community's moral code that constitutes the reference-fixing context. One standard objection to views of this type is that they fail to enable us to disagree in ordinary (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Access Problems and explanatory overkill.Silvia Jonas - 2017 - Philosophical Studies 174 (11):2731-2742.
    I argue that recent attempts to deflect Access Problems for realism about a priori domains such as mathematics, logic, morality, and modality using arguments from evolution result in two kinds of explanatory overkill: the Access Problem is eliminated for contentious domains, and realist belief becomes viciously immune to arguments from dispensability, and to non-rebutting counter-arguments more generally.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  36. Consciousness and accessibility.Ned Block - 1990 - Behavioral and Brain Sciences 13 (4):596-598.
    This is my first publication of the distinction between phenomenal consciousness and access consciousness, though not using quite those terms. It ends with this: "The upshot is this: If Searle is using the access sense of "consciousness," his argument doesn't get to first base. If, as is more likely, he intends the what-it-is-like sense, his argument depends on assumptions about issues that the cognitivist is bound to regard as deeply unsettled empirical questions." Searle replies: "He refers to what (...)
    Download  
     
    Export citation  
     
    Bookmark   125 citations  
  37.  61
    CONTEMPORARY DEVOPS STRATEGIES FOR AUGMENTING SCALABLE AND RESILIENT APPLICATION DEPLOYMENT ACROSS MULTI-CLOUD ENVIRONMENTS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):54-60.
    Containerization in a multi-cloud environment facilitates workload portability and optimized resource uti-lization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of containerization in multi-cloud environment. We conducted the Systematic Mapping Study (SMS) on the literature published between January (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Access externalism.John Gibbons - 2006 - Mind 115 (457):19-39.
    This paper argues for externalism about justification on the basis of thought experiments. I present cases in which two individuals are intrinsically and introspectively indistinguishable and in which intuitively, one is justified in believing that p while the other is not. I also examine an argument for internalism based on the ideas that we have privileged access to whether or not our own beliefs are justified and that only internalism is compatible with this privilege. I isolate what I take (...)
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  39. Armchair Access and Imagination.Giada Fratantonio - 2018 - Dialectica 72 (4):525-547.
    In this paper, I focus on the Armchair Access Problem for E=K as presented by Nicholas Silins (2005), and I argue, contra Silins, that it does not represent a real threat to E=K. More precisely, I put forward two lines of response, both of which put pressure on the main assumption of the argument, namely, the Armchair Access thesis. The first line of response focuses on its scope, while the second line of response focuses on its nature. The (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  40. Access to Justice and the Public Interest in the Administration of Justice.Lucinda Vandervort - 2012 - University of New Brunswick Law Journal 63:124-144.
    The public interest in the administration of justice requires access to justice for all. But access to justice must be “meaningful” access. Meaningful access requires procedures, processes, and institutional structures that facilitate communication among participants and decision-makers and ensure that judges and other decision-makers have the resources they need to render fully informed and sound decisions. Working from that premise, which is based on a reconceptualization of the objectives and methods of the justice process, the author (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Perceptual Consciousness and Cognitive Access from the Perspective of Capacity-Unlimited Working Memory.Steven Gross - forthcoming - Philosophical Transactions of the Royal Society B.
    Theories of consciousness divide over whether perceptual consciousness is rich or sparse in specific representational content and whether it requires cognitive access. These two issues are often treated in tandem because of a shared assumption that the representational capacity of cognitive access is fairly limited. Recent research on working memory challenges this shared assumption. This paper argues that abandoning the assumption undermines post-cue-based “overflow” arguments, according to which perceptual conscious is rich and does not require cognitive access. (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  42. The Hard Problem of Access for Epistemological Disjunctivism.Grad Paweł - forthcoming - Episteme:1-20.
    In this paper, I identify the hard problem of access for epistemological disjunctivism (ED): given that perceptual experience E is opaque with respect to its own epistemic properties, subject S is not in a position to know epistemic proposition (i) (that E is factive with respect to empirical proposition p) just by having E and/or reflecting on E. This is the case even if (i) is true. I first motivate the hard problem of access (Section 2) and then (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Access, phenomenology and sorites.Miguel Ángel Sebastián - 2018 - Ratio 31 (3):285-293.
    The non-transitivity of the relation looks the same as has been used to argue that the relation has the same phenomenal character as is non-transitive—a result that jeopardizes certain theories of consciousness. In this paper, I argue against this conclusion while granting the premise by dissociating lookings and phenomenology; an idea that some might find counter-intuitive. However, such an intuition is left unsupported once phenomenology and cognitive access are distinguished from each other; a distinction that is conceptually and empirically (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. The Cloud.Victor Adelino Ausina Mota - manuscript
    from monasticism to modern life, via Saint Francis and Buonaventura, euqating some purposes anda deliberations of an ideal and happy life on this complex world, even so you're not a social scientist or a social worker.
    Download  
     
    Export citation  
     
    Bookmark  
  45. 'Access to Justice' as Access to a Lawyer's Language.William Conklin - 1990 - Windsor Yearbook of Access to Justice 10:454-467.
    This essay claims that ‘access to justice’ has erroneously been assumed to be synonymous with invisible concepts instead of access to a lawyer’s language. The Paper outlines how a language concerns the relation between signifiers, better known as word-images, on the one hand, with signfieds, better known as concepts, on the other. The signifieds are universal, artificial and empty in content. Taking the Canadian Charter of Rights and Freedoms as an example, officials have assumed that Charter knowledge has (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  31
    (UN)FOLDING TIME A PHILOSOPHICAL ANALYSIS OF “CLOUD ATLAS” (2012).Gustavo Ruiz da Silva & Eberval Gadelha Figueiredo Jr - 2024 - Paralaxe 9 (1):18-33.
    This paper examines the film "Cloud Atlas" (2012), directed by Lana Wachowski, Tom Tykwer, and Lilly Wachowski, through a philosophical lens. It explores the narrative structure and creative choices of the film, comparing it to the original book by David Mitchell. The analysis focuses on the film's editing and its impact on the portrayal of time, while drawing on Gilles Deleuze's concept of “the fold” and Pierre Klossowski's notion of “vicious circle”. By investigating these philosophical ideas, the paper offers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Attention is Rational-Access Consciousness.Declan Smithies - 2011 - In Christopher Mole, Declan Smithies & Wayne Wu (eds.), Attention: Philosophical and Psychological Essays. New York: Oxford University Press. pp. 247--273.
    This chapter argues that attention is a distinctive mode of consciousness, which plays an essential functional role in making information accessible for use in the rational control of thought and action. The main line of argument can be stated quite simply. Attention is what makes information fully accessible for use in the rational control of thought and action. But what makes information fully accessible for use in the rational control of thought and action is a distinctive mode of consciousness. Therefore, (...)
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  49. The Conceptual Access-NeTwORk (CANTOR) Thesis: Theorizing the Development or Success of New Internet-Based Products, Services, or Technologies.La Shun L. Carroll - 2023 - Indonesian Journal of Innovation and Applied Sciences (Ijias) 3 (2):86-98.
    For any new internet-based product, service, or technology to succeed, it must satisfy the criterion of providing access to or creating a network of possible users, products, and services. This is the Conceptual Access-Network (CANTOR) Thesis proposed. In addition to the main issues of success and how and why internet technology evolves, the principle can also meet the objective of explaining what underlies a range of traditional and nontraditional technologies beyond the internet. Through qualitative exploration, the tenets of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Accessibility, implicit bias, and epistemic justification.Josefa Toribio - 2018 - Synthese 198 (Suppl 7):1529-1547.
    It has recently been argued that beliefs formed on the basis of implicit biases pose a challenge for accessibilism, since implicit biases are consciously inaccessible, yet they seem to be relevant to epistemic justification. Recent empirical evidence suggests, however, that while we may typically lack conscious access to the source of implicit attitudes and their impact on our beliefs and behaviour, we do have access to their content. In this paper, I discuss the notion of accessibility required for (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 977