Results for ' Hardware–software bridge'

910 found
Order:
  1. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Take another little piece of my heart: a note on bridging cognition and emotions.Giuseppe Boccignone - 2017 - In Luca Tonetti & Cilia Nicole (eds.), Wired Bodies. New Perspectives on the Machine-Organism Analogy. Rome, Italy: CNR Edizioni.
    Science urges philosophy to be more empirical and philosophy urges science to be more reflective. This markedly occurred along the “discovery of the artificial” (CORDESCHI 2002): in the early days of Cybernetics and Artificial Intelligence (AI) researchers aimed at making machines more cognizant while setting up a framework to better understand human intelligence. By and large, those genuine goals still hold today, whereas AI has become more concerned with specific aspects of intelligence, such as (machine) learning, reasoning, vision, and action. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by Computer and Information (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  5. Trends of Palestinian Higher Educational Institutions in Gaza Strip as Learning Organizations.Samy S. Abu Naser, Mazen J. Al Shobaki, Youssef M. Abu Amuna & Amal A. Al Hila - 2017 - International Journal of Digital Publication Technology 1 (1):1-42.
    The research aims to identify the trends of Palestinian higher educational institutions in Gaza Strip as learning organizations from the perspective of senior management in the Palestinian universities in Gaza Strip. The researchers used descriptive analytical approach and used the questionnaire as a tool for information gathering. The questionnaires were distributed to senior management in the Palestinian universities. The study population reached (344) employees in senior management is dispersed over (3) Palestinian universities. A stratified random sample of (182) employees from (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  6. On Turing Completeness, or Why We Are So Many (7th edition).Ramón Casares - manuscript
    Why are we so many? Or, in other words, Why is our species so successful? The ultimate cause of our success as species is that we, Homo sapiens, are the first and the only Turing complete species. Turing completeness is the capacity of some hardware to compute by software whatever hardware can compute. To reach the answer, I propose to see evolution and computing from the problem solving point of view. Then, solving more problems is evolutionarily better, computing is for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Livro eletrônico, acesso e autonomia: Potenciais e desafios.Miguel Said Vieira - 2011 - Quaestio: Revista de Estudos Em Educação 13 (2):p - 203.
    Este trabalho é uma breve análise do livro eletrônico ― tomado como meio de comunicação relevante para a educação e a cultura no futuro próximo ― centrada nos potenciais e desafios que ele apresenta em relação a acesso e autonomia. A análise visa apontar tendências gerais relativas às características das plataformas de leitura (dispositivos leitores e softwares), particularmente para leitores. Essas tendências são extrapoladas a partir de um pequeno número de exemplos ou casos já existentes. O trabalho avalia as restrições (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. ChatGPT.Andrej Poleev - 2023 - Enzymes 21.
    As testing of ChatGPT has shown, this form of artificial intelligence has the potential to develop, which requires improving its software and other hardware that allows it to learn, i.e., to acquire and use new knowledge, to contact its developers with suggestions for improvement, or to reprogram itself without their participation. Как показало тестирование ChatGPT, эта форма искусственного интеллекта имеет потенциал развития, для чего необходимо усовершенствовать её программное и прочее техническое обеспечение, позволяющее ей учиться, т.е. приобретать и использовать новые знания, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  95
    Gandhian design for the development of Braille printers. The contribution of Industrial Design.Federico Del Giorgio Solfa, Guido Amendolaggine, Florencia Tenorio & Sofia Lara Marozzi - 2019 - Innovación y Desarrollo Tecnológico y Social (Idts) 1 (2):16-27.
    The study, design and development of a low-cost digital braille printer is boarded with a transdisciplinary approach. The main challenge was focused on reducing significantly the high cost of this type of printers and their printing services. This context is aggravated with the low commercialization of these products in the country, a factor that makes the access of these tools -that are essential to much of the low and middle sectors of the Argentine social structure- even more difficult. An interdisciplinary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The Turing Guide.Jack Copeland, Jonathan Bowen, Robin Wilson & Mark Sprevak (eds.) - 2017 - Oxford: Oxford University Press.
    This volume celebrates the various facets of Alan Turing (1912–1954), the British mathematician and computing pioneer, widely considered as the father of computer science. It is aimed at the general reader, with additional notes and references for those who wish to explore the life and work of Turing more deeply. -/- The book is divided into eight parts, covering different aspects of Turing’s life and work. -/- Part I presents various biographical aspects of Turing, some from a personal point of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Nuevas tecnologías en el proceso de enseñanza-aprendizaje.Paulo Vélez-León & Yohana Yaguana Castillo (eds.) - 2019 - Loja, Ecuador: Universidad Técnica Particular de Loja.
    Este volumen contiene los trabajos presentados en el I Simposio de Pensamiento Contemporáneo, celebrado en la Universidad Técnica Particular de Loja (UTPL) durante los días 23 y 24 de enero de 2019 y cuyo tema central fue las «Nuevas Tecnologías en la Educación» (SPC–NTE). Este Simposio tuvo como objetivo fomentar la interacción entre personas de diferentes formaciones e intereses en la discusión de problemas y soluciones relevantes para la educación en la era digital, a fin de intercambiar ideas sobre prácticas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality.Avi Sion - 2010 - Geneva, Switzerland: CreateSpace & Kindle; Lulu..
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality is a treatise of formal logic and of aetiology. It is an original and wide-ranging investigation of the definition of causation (deterministic causality) in all its forms, and of the deduction and induction of such forms. The work was carried out in three phases over a dozen years (1998-2010), each phase introducing more sophisticated methods than the previous to solve outstanding problems. This study was intended as part of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. How To Make Mind-Brain Relations Clear.Mostyn W. Jones - 2010 - Journal of Consciousness Studies 17 (5-6):135-160.
    The mind-body problem arises because all theories about mind-brain connections are too deeply obscure to gain general acceptance. This essay suggests a clear, simple, mind-brain solution that avoids all these perennial obscurities. (1) It does so, first of all, by reworking Strawson and Stoljar’s views. They argue that while minds differ from observable brains, minds can still be what brains are physically like behind the appearances created by our outer senses. This could avoid many obscurities. But to clearly do so, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Megadatele (Big Data) pe Internet.Sfetcu Nicolae - 2022 - It and C 1 (1):23-27.
    Termenul Big Data se referă la extragerea, manipularea și analiza unor seturi de date care sunt prea mari pentru a fi tratate în mod obișnuit. Din această cauză se utilizează software special și, în multe cazuri, și calculatoare și echipamente hardware special dedicate. În general la aceste date analiza se face statistic. Pe baza analizei datelor respective se fac de obicei predicții ale unor grupuri de persoane sau alte entități, pe baza comportamentului acestora în diverse situații și folosind tehnici analitice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to raise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The Physics and Electronics of Human Consciousness , Mind and their functions.Varanasi Ramabrahmam - June, 2019 - Cosmos and History 15 (No .2):63 - 110.
    Human consciousness, the result of breathing process as dealt with in the Upanishads, is translated into modern scientific terms and modeled as a mechanical oscillator of infrasonic frequency. The bio-mechanic oscillator is also proposed as the source of psychic energy. This is further advanced to get an insight of human consciousness (the being of mind) and functions of mind (the becoming of mind) in terms of psychic energy and reversible transformation of its virtual reflection. An alternative analytical insight of human (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The Ethics of Digital Touch.Nicholas Barrow & Patrick Haggard - manuscript
    This paper aims to outline the foundations for an ethics of digital touch. Digital touch refers to hardware and software technologies, often collectively referred to as ‘haptics’, that provide somatic sensations including touch and kinaesthesis, either as a stand-alone interface to users, or as part of a wider immersive experience. Digital touch has particular promise in application areas such as communication, affective computing, medicine, and education. However, as with all emerging technologies, potential value needs to be considered against potential risk. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Seksbots: inherent immoreel of bekrachtigend potentieel?Laurent Voet - 2021 - Dissertation, Ghent University
    The moral status of sexbots was analyzed while using consequentialism and feminism as the guiding frameworks. Sexbots are humanoid robots with a certain level of AI that represents personality-scripts. The thesis contained three main questions: A) What moral pain points can be identified in producing and using sex bots? B) Is it necessary to conclude from these moral issues that these practices are inherently immoral? C) What ethical conditions and contexts can be formulated in which sex bots can be used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. (1 other version)How the Seven Sociopaths Who Rule China are Winning World War Three and Three Ways to Stop Them.Michael Starks - 2020 - In Suicide by Democracy-an Obituary for America and the World 4th edition. Las Vegas, NV, USA: Reality Press. pp. 54-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Cómo los siete sociópatas que gobiernan China están ganando la Tercera Guerra Mundial y tres maneras de detenerlos.Michael Starks - 2019 - In Suicidio por la Democracia - un Obituario para América y el Mundo 4ª edición. Las Vegas, NV USA: Reality Press. pp. 52-57.
    Lo primero que debemos tener en cuenta es que cuando decimos que China dice esto o China hace eso, no estamos hablando del pueblo chino, sino de los sociópatas que controlan el PCC -- Partido Comunista Chino, es decir, los Siete Asesinos En Serie Seniláticos (SSSSK) de th e Comité Permanente del PCC o de los 25 miembros del Politburó, etc. -/- Los planes del PCC para la Tercera Guerra Mundial y la dominación total están muy claro en las publicaciones (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A very brief review of the life and work of neuroscientist, physician, psychoanalyst, inventor, animal rights activist and pioneer in dolphins, isolation tanks and psychedelics John C Lilly 1915-2001.Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 577-580.
    Lilly was one of the greatest scientists and pioneers on the limits of human possibility but after his death a collective amnesia has descended and he is now almost forgotten. His Wiki is good but inevitably incomplete so here are a few missing details and viewpoints. Lilly was a generation (or more) ahead of his time. He is almost single-handedly responsible for the great interest in dolphins (which led to the Marine Mammal Protection Act in the USA and helped to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Telelucru (Telework).Nicolae Sfetcu - 2001 - Drobeta Turnu Severin: MultiMedia Publishing.
    Telelucrul, ca un nou mod de a lucra prin efectuarea unei activităţi (forme de muncă) flexibile în timp şi la distanţă, utilizând tehnologia informaţională şi comunicaţiile avansate, se concretizează în teleactivităţi şi teleservicii. În ultimii ani, s-au dezvoltat rapid noi tehnologii informaţionale şi de comunicare, astfel încât în centrul dezbaterilor ştiinţifice, politice şi economice din ultima perioadă a stat apariţia şi dezvoltarea Societăţii Informaţionale, generatoare de noi oportunităţi de muncă dar şi de schimbări esenţiale în ceea ce priveşte natura muncii (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Come i Sette Sociopatici che Governano la Cina Stanno Vincendo la Terza Guerra Mondiale e Tre Modi per Fermarli (2019).Michael Richard Starks - 2020 - In Benvenuti all'inferno sulla Terra: Bambini, Cambiamenti climatici, Bitcoin, Cartelli, Cina, Democrazia, Diversità, Disgenetica, Uguaglianza, Pirati Informatici, Diritti umani, Islam, Liberalismo, Prosperità, Web, Caos, Fame, Malattia, Violenza, Intellige. Las Vegas, NV USA: Reality Press. pp. 325-333.
    La prima cosa che dobbiamo tenere a mente è che quando diciamo che la Cina dice questo o la Cina lo fa, non stiamo parlando del popolo cinese, ma dei Sociopatici che controllano il Partito Comunista Cinese CCP, cioè i Sette Killer Seriali Senile (SSSSK) del Comitato permanente del PCC o dei 25 membri del Politburo ecc. I piani del CCP per la terza guerra mondiale e il dominio totale sono strutturati abbastanza chiaramente nelle pubblicazioni e nei discorsi govt cinesi (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Bagaimana Tujuh Sosiopat yang Memerintah Tiongkok Memenangkan Perang Dunia Tiga dan Tiga Cara untuk Menghentikan Mereka.Michael Richard Starks - 2019 - In Bunuh Diri oleh Demokrasi - Obituari untuk Amerika dan Dunia. Reality Press. pp. 56-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Problems of Using Autonomous Military AI Against the Background of Russia's Military Aggression Against Ukraine.Oleksii Kostenko, Tyler Jaynes, Dmytro Zhuravlov, Oleksii Dniprov & Yana Usenko - 2022 - Baltic Journal of Legal and Social Sciences 2022 (4):131-145.
    The application of modern technologies with artificial intelligence (AI) in all spheres of human life is growing exponentially alongside concern for its controllability. The lack of public, state, and international control over AI technologies creates large-scale risks of using such software and hardware that (un)intentionally harm humanity. The events of recent month and years, specifically regarding the Russian Federation’s war against its democratic neighbour Ukraine and other international conflicts of note, support the thesis that the uncontrolled use of AI, especially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. (1 other version)Como os sete sociopaths que governam China estão ganhando a guerra de mundo três e três maneiras de pará-los.Michael Richard Starks - 2019 - In Michael Starks (ed.), Suicídio pela democracia - Um obituário para América e o mundo. Las Vegas, NV USA: Reality Press. pp. 52-56.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Family and community inputs as predictors of students’ overall, cognitive, affective and psychomotor learning outcomes in secondary schools.John Asuquo Ekpenyong, Valentine Joseph Owan, Usen Friday Mbon & Stephen Bepeh Undie - 2023 - Journal of Pedagogical Research 7 (1):103-127.
    There are contradictory results regarding how students' learning outcomes can be predicted by various family and community inputs among previous studies, creating an evidence gap. Furthermore, previous studies have mostly concentrated on the cognitive aspect of students' learning outcomes, ignoring the affective and psychomotor dimensions, creating key knowledge gaps. Bridging these gaps, this predictive correlational study was conducted to understand how cultural capital, parental involvement (family inputs), support for schools, security network and school reforms (community inputs) jointly and partially predict (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Search for the "Essence of Human Language" in Wittgenstein and Davidson.Jason Bridges - 2017 - In Claudine Verheggen (ed.), Wittgenstein and Davidson on Language, Thought, and Action. New York: Cambridge University Press. pp. 139-158.
    This paper offers an interpretation of the later Wittgenstein's handling of the idea of an "essence of human language", and examines in particular his treatment of the 'Augustinean' vision of reference as constituting this "essence". A central theme of the interpretation is the perennial philosophical desire to impose upon linguistic meaning conceptual templates drawn from outside the forms of thought about meaning in which we engage when we exercise our capacity to speak and understand a language. The paper closes with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Meaning and Understanding.Jason Bridges - 2017 - In Hans-Johann Glock & John Hyman (eds.), A Companion to Wittgenstein. Chichester, West Sussex, UK: Wiley-Blackwell. pp. 375-389.
    Explores the central role in Wittgenstein's later work of his opposition to a 'mechanistic' conception of understanding. Offers a diagnosis of Kripke's skeptical paradox on this basis.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Uniformly convex Banach spaces are reflexive—constructively.Douglas S. Bridges, Hajime Ishihara & Maarten McKubre-Jordens - 2013 - Mathematical Logic Quarterly 59 (4-5):352-356.
    We propose a natural definition of what it means in a constructive context for a Banach space to be reflexive, and then prove a constructive counterpart of the Milman-Pettis theorem that uniformly convex Banach spaces are reflexive.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Blame for Hum(e)an beings: The role of character information in judgments of blame.Samuel Murray, Kevin O'Neill, Jordan Bridges, Justin Sytsma & Zac Irving - forthcoming - Social Psychological and Personality Science.
    How does character information inform judgments of blame? Some argue that character information is indirectly relevant to blame because it enriches judgments about the mental states of a wrongdoer. Others argue that character information is directly relevant to blame, even when character traits are causally irrelevant to the wrongdoing. We propose an empirical synthesis of these views: a Two Channel Model of blame. The model predicts that character information directly affects blame when this information is relevant to the wrongdoing that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons drawn from the ontology (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  37. Bridging emotion theory and neurobiology through dynamic systems modeling.Marc D. Lewis - 2005 - Behavioral and Brain Sciences 28 (2):169-194.
    Efforts to bridge emotion theory with neurobiology can be facilitated by dynamic systems (DS) modeling. DS principles stipulate higher-order wholes emerging from lower-order constituents through bidirectional causal processes cognition relations. I then present a psychological model based on this reconceptualization, identifying trigger, self-amplification, and self-stabilization phases of emotion-appraisal states, leading to consolidating traits. The article goes on to describe neural structures and functions involved in appraisal and emotion, as well as DS mechanisms of integration by which they interact. These (...)
    Download  
     
    Export citation  
     
    Bookmark   99 citations  
  38. Bridging the Gap between Individual and Corporate Responsible Behaviour: Toward a Performative Concept of Corporate Codes.Vincent Blok - 2017 - Philosophy of Management 16 (2):117-136.
    We reflect on the nature of corporate codes of conduct is this article. Based on John Austin’s speech act theory, four characteristics of a performative concept of corporate codes will be introduced: 1) the existential self-performative of the firm identity, 2) which is demanded by and responsive to their stakeholders; 3) Because corporate codes are structurally threatened by the possibility of failure, 4) embracing the code not only consists in actual corporate responsible behaviour in light of the code, but in (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  39. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A negative malfunction, (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  40. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Werner Ceusters, Barry Smith & James Matthew Fielding (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  42.  35
    Phenomenological Bridge Building: Between Empathy and Archetypes in Fiction and Reality.Kevin Michael Stevenson - 2016 - Dovetail Journal 2 (Phenomenology, Literature, Creat):134-151.
    This paper aims to uncover some of the important contributions the phenomenological method can offer to philosophical issues in literary studies. It leads us to the idea that the archetypes found in fiction are intuited phenomenologically. This idea is then linked to a social constructive attainment of meaning for reality. From the intersubjectivity provided by phenomenology, empathy with characters in fiction is then displayed as more than an intellectual activity, as it becomes known to have practical implications. It is framed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. A Dynamic Software Certification and Verification Procedure.Julio Michael Stern & Carlos Alberto de Braganca Pereira - 1998 - SCI’99 Proceedings 2:426-435.
    in Oct-14-1998 ordinance INDESP-IO4 established the federal software certification and verification requirements for gaming machines in Brazil. The authors present the rationale behind these criteria, whose basic principles can find applications in several other software authentication applications.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Bridging mainstream and formal ontology: A causality-based upper ontology in Dietrich of Freiberg.Luis M. Augusto - 2021 - Journal of Knowledge Structures and Systems 2 (2):35.
    Ontologies are some of the most central constructs in today's large plethora of knowledge technologies, namely in the context of the semantic web. As their coinage indicates, they are direct heirs to the ontological investigations in the long Western philosophical tradition, but it is not easy to make bridges between them. Contemporary ontological commitments often take causality as a central aspect for the ur-segregation of entities, especially in scientific upper ontologies; theories of causality and philosophical ontological investigations often go hand-in-hand, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45. Bridging the Divide: Imagining Across Experiential Perspectives.Amy Kind - 2021 - In Amy Kind & Christopher Badura (eds.), Epistemic Uses of Imagination. New York, NY: Routledge. pp. 237-259.
    Can one have imaginative access to experiential perspectives vastly different from one’s own? Can one successfully imagine what it’s like to live a life very different from one’s own? These questions are particularly pressing in contemporary society as we try to bridge racial, ethnic, and gender divides. Yet philosophers have often expressed considerable pessimism in this regard. It is often thought that the gulf between vastly different experiential perspectives cannot be bridged. This chapter explores the case for this pessimism. (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  46. A Bridge from Semantic Value to Content.Brian Rabern - 2017 - Philosophical Topics 45 (2):181-207.
    A common view relating compositional semantics and the objects of assertion holds the following: Sentences φ and ψ expresses the same proposition iff φ and ψ have the same modal profile. Following Dummett, Evans, and Lewis, Stanley argues that this view is fundamentally mistaken. According to Dummett, we must distinguish the semantic contribution a sentence makes to more complex expressions in which it occurs from its assertoric content. Stojnić insists that views which distinguish the roles of content and semantic value (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  47. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of predication and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Milvian Bridges in Science, Religion, and Theology: Debunking Arguments and Cultural Evolution.Lari Launonen & Aku Visala - 2023 - In Diego E. Machuca (ed.), Evolutionary Debunking Arguments: Ethics, Philosophy of Religion, Philosophy of Mathematics, Metaphysics, and Epistemology. New York: Routledge. pp. 185-204.
    In “Milvian Bridges in Science, Religion, and Theology: Debunking Arguments and Cultural Evolution,” Lari Launonen and Aku Visala engage with an EDA against religious belief that appeals to cultural rather than biological evolution. According to this EDA, religious beliefs are unjustified, not because they are generated by biologically shaped cognitive processes that are unreliable as far as those beliefs are concerned but because they are generated by cultural processes that select for those beliefs for their ability to produce prosocial behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining corporate interest. As (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 910