Results for 'In finity Computer'

999 found
Order:
  1. Computation of higher order Lie derivatives on the Infinity Computer.Felice Iavernaro, Francesca Mazzia, Marat Mukhametzhanov & Yaroslav Sergeyev - 2021 - Journal of Computational and Applied Mathematics 383:113135.
    In this paper, we deal with the computation of Lie derivatives, which are required, for example, in some numerical methods for the solution of differential equations. One common way for computing them is to use symbolic computation. Computer algebra software, however, might fail if the function is complicated, and cannot be even performed if an explicit formulation of the function is not available, but we have only an algorithm for its computation. An alternative way to address the problem is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Tracking Early Differences in Tetris Perfomance Using Eye Aspect Ratio Extracted Blinks.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in 'T. Veld & Pieter Spronck - 2023 - IEEE Transactions on Games 1:1-8.
    This study aimed to evaluate if eye blinks can be used to discriminate players with different performance in a session of Nintendo Entertainment System (NES) Tetris. To that end, we developed a state-of-the-art method for blink extraction from EAR measures, which is robust enough to be used with data collected by a low-grade webcam such as the ones widely available on laptop computers. Our results show a significant decrease in blink rate per minute (blinks/m) during the first minute of playing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Predicting Tetris Performance Using Early Keystrokes.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in 'T. Veld & Pieter Spronck - 2023 - Fdg '23: Proceedings of the 18Th International Conference on the Foundations of Digital Games 46:1-4.
    In this study, we predict the different levels of performance in a Nintendo Entertainment System (NES) Tetris session based on the score and the number of matches played by the players. Using the first 45 seconds of gameplay, a Random Forest Classifier was trained on the five keys used in the game obtaining a ROC_AUC score of 0.80. Further analysis revealed that the number of down keys (forced drop) and the number of left keys (left translation) are the most relevant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Transparency in Complex Computational Systems.Kathleen A. Creel - 2020 - Philosophy of Science 87 (4):568-589.
    Scientists depend on complex computational systems that are often ineliminably opaque, to the detriment of our ability to give scientific explanations and detect artifacts. Some philosophers have s...
    Download  
     
    Export citation  
     
    Bookmark   53 citations  
  5. Problems and Solutions in Researching Computer Game Assisted Dialogues for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2022 - Designs for Learning 1 (14):46–51.
    In this paper, we describe technological advances for supporting persons with aphasia in philosophical dialogues about personally relevant and contestable questions. A computer game-based application for iPads is developed and researched through Living Lab inspired workshops in order to promote the target group’s communicative participation during group argumentation. We outline some central parts of the background theory of the application and some of its main features, which are related to needs of the target group. Methodological issues connected to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we present an analytical comparison for the combinations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Illusion of Agency in Human–Computer Interaction.Michael Madary - 2022 - Neuroethics 15 (1):1-15.
    This article makes the case that our digital devices create illusions of agency. There are times when users feel as if they are in control when in fact they are merely responding to stimuli on the screen in predictable ways. After the introduction, the second section of the article offers examples of illusions of agency that do not involve human–computer interaction in order to show that such illusions are possible and not terribly uncommon. The third and fourth sections of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Genome Informatics: The Role of DNA in Cellular Computations.James A. Shapiro - 2006 - Biological Theory 1 (3):288-301.
    Cells are cognitive entities possessing great computational power. DNA serves as a multivalent information storage medium for these computations at various time scales. Information is stored in sequences, epigenetic modifications, and rapidly changing nucleoprotein complexes. Because DNA must operate through complexes formed with other molecules in the cell, genome functions are inherently interactive and involve two-way communication with various cellular compartments. Both coding sequences and repetitive sequences contribute to the hierarchical systemic organization of the genome. By virtue of nucleoprotein complexes, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9.  65
    A few little steps beyond Knuth’s Boolean Logic Table with Neutrosophic Logic: A Paradigm Shift in Uncertain Computation.Florentin Smarandache & Victor Christianto - 2023 - Prospects for Applied Mathematics and Data Analysis 2 (2):22-26.
    The present article delves into the extension of Knuth’s fundamental Boolean logic table to accommodate the complexities of indeterminate truth values through the integration of neutrosophic logic (Smarandache & Christianto, 2008). Neutrosophic logic, rooted in Florentin Smarandache’s groundbreaking work on Neutrosophic Logic (cf. Smarandache, 2005, and his other works), introduces an additional truth value, ‘indeterminate,’ enabling a more comprehensive framework to analyze uncertainties inherent in computational systems. By bridging the gap between traditional boolean operations and the indeterminacy present in various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. How Downwards Causation Occurs in Digital Computers.George Ellis - manuscript
    Digital computers carry out algorithms coded in high level programs. These abstract entities determine what happens at the physical level: they control whether electrons flow through specific transistors at specific times or not, entailing downward causation in both the logical and implementation hierarchies. This paper explores how this is possible in the light of the alleged causal completeness of physics at the bottom level, and highlights the mechanism that enables strong emergence (the manifest causal effectiveness of application programs) to occur. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  12. HCI Model with Learning Mechanism for Cooperative Design in Pervasive Computing Environment.Hong Liu, Bin Hu & Philip Moore - 2015 - Journal of Internet Technology 16.
    This paper presents a human-computer interaction model with a three layers learning mechanism in a pervasive environment. We begin with a discussion around a number of important issues related to human-computer interaction followed by a description of the architecture for a multi-agent cooperative design system for pervasive computing environment. We present our proposed three- layer HCI model and introduce the group formation algorithm, which is predicated on a dynamic sharing niche technology. Finally, we explore the cooperative reinforcement learning (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and its (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Support-Neutrosophic Set: A New Concept in Soft Computing.Nguyen Xuan Thao, Florentin Smarandache & Nguyen Van Dinh - 2017 - Neutrosophic Sets and Systems 16:93-98.
    Today, soft computing is a field that is used a lot in solving real-world problems, such as problems in economics, finance, banking... With the aim to serve for solving the real problem, many new theories and/or tools which were proposed, improved to help soft computing used more efficiently. We can mention some theories as fuzzy sets theory (L. Zadeh, 1965), intuitionistic fuzzy set (K Atanasov, 1986), neutrosophic set (F. Smarandache 1999). In this paper, we introduce a new notion of sup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Why we are not living in the computer simulation.Abraham Lim - 2022 - International Journal for the Study of Skepticism.
    Nick Bostrom considered a number of simulations and contended that the probability that we are living in one of them is high or at least nonzero. I present arguments to refute the claim that we are or might be in any one of them. -/- Here is a highly dense reasoning why we are not in the simulation: -/- Suppose Simon is in the simulation, and he entertains the idea that he is in the simulation. And he thinks about the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Computer Simulations in Science and Engineering. Concept, Practices, Perspectives.Juan Manuel Durán - 2018 - Springer.
    This book addresses key conceptual issues relating to the modern scientific and engineering use of computer simulations. It analyses a broad set of questions, from the nature of computer simulations to their epistemological power, including the many scientific, social and ethics implications of using computer simulations. The book is written in an easily accessible narrative, one that weaves together philosophical questions and scientific technicalities. It will thus appeal equally to all academic scientists, engineers, and researchers in industry (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  18. Counterpossibles in Science: The Case of Relative Computability.Matthias Jenny - 2018 - Noûs 52 (3):530-560.
    I develop a theory of counterfactuals about relative computability, i.e. counterfactuals such as 'If the validity problem were algorithmically decidable, then the halting problem would also be algorithmically decidable,' which is true, and 'If the validity problem were algorithmically decidable, then arithmetical truth would also be algorithmically decidable,' which is false. These counterfactuals are counterpossibles, i.e. they have metaphysically impossible antecedents. They thus pose a challenge to the orthodoxy about counterfactuals, which would treat them as uniformly true. What’s more, I (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  19. Effective Physical Processes and Active Information in Quantum Computing.Ignazio Licata - 2007 - Quantum Biosystems 1 (1):51-65.
    The recent debate on hypercomputation has raised new questions both on the computational abilities of quantum systems and the Church-Turing Thesis role in Physics.We propose here the idea of “effective physical process” as the essentially physical notion of computation. By using the Bohm and Hiley active information concept we analyze the differences between the standard form (quantum gates) and the non-standard one (adiabatic and morphogenetic) of Quantum Computing, and we point out how its Super-Turing potentialities derive from an incomputable information (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Info-Computational Turn in Bioethics.Constantin Vică - 2018 - In Emilian Mihailov, Tenzin Wangmo, Victoria Federiuc & Bernice S. Elger (eds.), Contemporary Debates in Bioethics: European Perspectives. [Berlin]: De Gruyter Open. pp. 108-120.
    Our technological lifeworld has become an info-computational media populated by data and algorithms, an artificial environment for life and shared experiences. In this chapter, I tried to sketch three new assumptions for bioethics – it is hardly possible to substantiate ethical guidelines or an idea of normativity in an aprioristic manner; moral status is a function of data entities, not something solely human; agency is plural and thus is shared or sometimes delegated – in order to chart a proposal for (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Computation in Physical Systems: A Normative Mapping Account.Paul Schweizer - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich (eds.), On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 27-47.
    The relationship between abstract formal procedures and the activities of actual physical systems has proved to be surprisingly subtle and controversial, and there are a number of competing accounts of when a physical system can be properly said to implement a mathematical formalism and hence perform a computation. I defend an account wherein computational descriptions of physical systems are high-level normative interpretations motivated by our pragmatic concerns. Furthermore, the criteria of utility and success vary according to our diverse purposes and (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  23. Computational modeling in philosophy: introduction to a topical collection.Simon Scheller, Christoph Merdes & Stephan Hartmann - 2022 - Synthese 200 (2):1-10.
    Computational modeling should play a central role in philosophy. In this introduction to our topical collection, we propose a small topology of computational modeling in philosophy in general, and show how the various contributions to our topical collection fit into this overall picture. On this basis, we describe some of the ways in which computational models from other disciplines have found their way into philosophy, and how the principles one found here still underlie current trends in the field. Moreover, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Why we are almost certainly *not* in a computer simulation.Paul Merriam - manuscript
    I give a reason we are almost certainly *not* in a simulation. I also consider what happens if two simulators simulate each other.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Natural morphological computation as foundation of learning to learn in humans, other living organisms, and intelligent machines.Gordana Dodig-Crnkovic - 2020 - Philosophies 5 (3):17-32.
    The emerging contemporary natural philosophy provides a common ground for the integrative view of the natural, the artificial, and the human-social knowledge and practices. Learning process is central for acquiring, maintaining, and managing knowledge, both theoretical and practical. This paper explores the relationships between the present advances in understanding of learning in the sciences of the artificial, natural sciences, and philosophy. The question is, what at this stage of the development the inspiration from nature, specifically its computational models such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Computing in the nick of time.J. Brendan Ritchie & Colin Klein - 2023 - Ratio 36 (3):169-179.
    The medium‐independence of computational descriptions has shaped common conceptions of computational explanation. So long as our goal is to explain how a system successfully carries out its computations, then we only need to describe the abstract series of operations that achieve the desired input–output mapping, however they may be implemented. It is argued that this abstract conception of computational explanation cannot be applied to so‐called real‐time computing systems, in which meeting temporal deadlines imposed by the systems with which a device (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Ethics in e-trust and e-trustworthiness: the case of direct computer-patient interfaces.Philip J. Nickel - 2011 - Ethics and Information Technology 13 (2):355-363.
    In this paper, I examine the ethics of e - trust and e - trustworthiness in the context of health care, looking at direct computer-patient interfaces (DCPIs), information systems that provide medical information, diagnosis, advice, consenting and/or treatment directly to patients without clinicians as intermediaries. Designers, manufacturers and deployers of such systems have an ethical obligation to provide evidence of their trustworthiness to users. My argument for this claim is based on evidentialism about trust and trustworthiness: the idea that (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  29. A Computational Framework for Concept Representation in Cognitive Systems and Architectures: Concepts as Heterogeneous Proxytypes.Antonio Lieto - 2014 - Proceedings of 5th International Conference on Biologically Inspired Cognitive Architectures, Boston, MIT, Pocedia Computer Science, Elsevier:1-9.
    In this paper a possible general framework for the representation of concepts in cognitive artificial systems and cognitive architectures is proposed. The framework is inspired by the so called proxytype theory of concepts and combines it with the heterogeneity approach to concept representations, according to which concepts do not constitute a unitary phenomenon. The contribution of the paper is twofold: on one hand, it aims at providing a novel theoretical hypothesis for the debate about concepts in cognitive sciences by providing (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  30. Computability in Quantum Mechanics.Wayne C. Myrvold - 1995 - In Werner De Pauli-Schimanovich, Eckehart Köhler & Friedrich Stadler (eds.), Vienna Circle Institute Yearbook. Kluwer Academic Publishers. pp. 33-46.
    In this paper, the issues of computability and constructivity in the mathematics of physics are discussed. The sorts of questions to be addressed are those which might be expressed, roughly, as: Are the mathematical foundations of our current theories unavoidably non-constructive: or, Are the laws of physics computable?
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Platonic Computer— the Universal Machine That Bridges the “Inverse Explanatory Gap” in the Philosophy of Mind.Simon X. Duan - 2022 - Filozofia i Nauka 10:285-302.
    The scope of Platonism is extended by introducing the concept of a “Platonic computer” which is incorporated in metacomputics. The theoretical framework of metacomputics postulates that a Platonic computer exists in the realm of Forms and is made by, of, with, and from metaconsciousness. Metaconsciousness is defined as the “power to conceive, to perceive, and to be self-aware” and is the formless, con-tentless infinite potentiality. Metacomputics models how metaconsciousness generates the perceived actualities including abstract entities and physical and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Ghost in the Machine: A Philosophical Analysis of the Relationship Between Brain-Computer Interface Applications and their Users.Richard Heersmink - 2009 - Dissertation, University of Twente.
    This Master’s thesis explores the relationship between Brain-Computer Interfaces (BCIs) and their human users from a functional, epistemological and phenomenological perspective. The analysis has four steps. I start out with a technical description of BCI systems in which I conceptually analyze different types of BCI applications. This results in the development of a taxonomy of applications which is the point of departure for further philosophical analysis. Thereafter, I explore the functional relationship between BCI applications and their users. That is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Computational capacity of pyramidal neurons in the cerebral cortex.Danko D. Georgiev, Stefan K. Kolev, Eliahu Cohen & James F. Glazebrook - 2020 - Brain Research 1748:147069.
    The electric activities of cortical pyramidal neurons are supported by structurally stable, morphologically complex axo-dendritic trees. Anatomical differences between axons and dendrites in regard to their length or caliber reflect the underlying functional specializations, for input or output of neural information, respectively. For a proper assessment of the computational capacity of pyramidal neurons, we have analyzed an extensive dataset of three-dimensional digital reconstructions from the NeuroMorphoOrg database, and quantified basic dendritic or axonal morphometric measures in different regions and layers of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Philosophy of Mind Is (in Part) Philosophy of Computer Science.Darren Abramson - 2011 - Minds and Machines 21 (2):203-219.
    In this paper I argue that whether or not a computer can be built that passes the Turing test is a central question in the philosophy of mind. Then I show that the possibility of building such a computer depends on open questions in the philosophy of computer science: the physical Church-Turing thesis and the extended Church-Turing thesis. I use the link between the issues identified in philosophy of mind and philosophy of computer science to respond (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. Extended Computation: Wide Computationalism in Reverse.Paul Smart, Wendy Hall & Michael Boniface - 2021 - Proceedings of the 13th ACM Web Science Conference (Companion Volume).
    Arguments for extended cognition and the extended mind are typically directed at human-centred forms of cognitive extension—forms of cognitive extension in which the cognitive/mental states/processes of a given human individual are subject to a form of extended or wide realization. The same is true of debates and discussions pertaining to the possibility of Web-extended minds and Internet-based forms of cognitive extension. In this case, the focus of attention concerns the extent to which the informational and technological elements of the online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Representation in semiotics and in computer science.Winfried Nöth - 1997 - Semiotica 115 (3-4):203-214.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  37. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked in accounts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. The Cognitive Basis of Computation: Putting Computation in Its Place.Daniel D. Hutto, Erik Myin, Anco Peeters & Farid Zahnoun - 2018 - In Mark Sprevak & Matteo Colombo (eds.), The Routledge Handbook of the Computational Mind. Routledge. pp. 272-282.
    The mainstream view in cognitive science is that computation lies at the basis of and explains cognition. Our analysis reveals that there is no compelling evidence or argument for thinking that brains compute. It makes the case for inverting the explanatory order proposed by the computational basis of cognition thesis. We give reasons to reverse the polarity of standard thinking on this topic, and ask how it is possible that computation, natural and artificial, might be based on cognition and not (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  39. Computing Mechanisms and Autopoietic Systems.Joe Dewhurst - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 17-26.
    This chapter draws an analogy between computing mechanisms and autopoietic systems, focusing on the non-representational status of both kinds of system (computational and autopoietic). It will be argued that the role played by input and output components in a computing mechanism closely resembles the relationship between an autopoietic system and its environment, and in this sense differs from the classical understanding of inputs and outputs. The analogy helps to make sense of why we should think of computing mechanisms as non-representational, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. A Computational Theory of Perspective and Reference in Narrative.Janyce M. Wiebe & William J. Rapaport - 1988 - In Proceedings of the 26th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics. pp. 131-138.
    Narrative passages told from a character's perspective convey the character's thoughts and perceptions. We present a discourse process that recognizes characters'.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on first. Then,cloud desktop for oil (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Enactive autonomy in computational systems.Mario Villalobos & Joe Dewhurst - 2018 - Synthese 195 (5):1891-1908.
    In this paper we will demonstrate that a computational system can meet the criteria for autonomy laid down by classical enactivism. The two criteria that we will focus on are operational closure and structural determinism, and we will show that both can be applied to a basic example of a physically instantiated Turing machine. We will also address the question of precariousness, and briefly suggest that a precarious Turing machine could be designed. Our aim in this paper is to challenge (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  43. Lightning in a Bottle: Complexity, Chaos, and Computation in Climate Science.Jon Lawhead - 2014 - Dissertation, Columbia University
    Climatology is a paradigmatic complex systems science. Understanding the global climate involves tackling problems in physics, chemistry, economics, and many other disciplines. I argue that complex systems like the global climate are characterized by certain dynamical features that explain how those systems change over time. A complex system's dynamics are shaped by the interaction of many different components operating at many different temporal and spatial scales. Examining the multidisciplinary and holistic methods of climatology can help us better understand the nature (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1-9.
    The paper provides a critical review of the debate on the foundations of Computer Ethics (CE). Starting from a discussion of Moor’s classic interpretation of the need for CE caused by a policy and conceptual vacuum, five positions in the literature are identified and discussed: the “no resolution approach”, according to which CE can have no foundation; the professional approach, according to which CE is solely a professional ethics; the radical approach, according to which CE deals with absolutely unique (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  45. Using Computer-Assisted Argument Mapping to Teach Reasoning to Students.Martin Davies, Ashley Barnett & Tim van Gelder - 2021 - In J. Anthony Blair (ed.), The Critical Thinking Anthology. pp. 115-152.
    Argument mapping is a way of diagramming the logical structure of an argument to explicitly and concisely represent reasoning. The use of argument mapping in critical thinking instruction has increased dramatically in recent decades. This paper overviews the innovation and provides a procedural approach for new teaches wanting to use argument mapping in the classroom. A brief history of argument mapping is provided at the end of this paper.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Semantics and the Computational Paradigm in Cognitive Psychology.Eric Dietrich - 1989 - Synthese 79 (1):119-141.
    There is a prevalent notion among cognitive scientists and philosophers of mind that computers are merely formal symbol manipulators, performing the actions they do solely on the basis of the syntactic properties of the symbols they manipulate. This view of computers has allowed some philosophers to divorce semantics from computational explanations. Semantic content, then, becomes something one adds to computational explanations to get psychological explanations. Other philosophers, such as Stephen Stich, have taken a stronger view, advocating doing away with semantics (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  47. Computational Design. Design in the Age of a Knowledge Society.Mihai Nadin - 1996 - Formdiskurs 2 (1):40-60.
    Download  
     
    Export citation  
     
    Bookmark  
  48.  95
    Computers in design education: a case study.Mihai Nadin - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  49.  88
    Computational Design: Design in the Age of a Knowledge Society.Mihai Nadin - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  50. Psychological and Computational Models of Language Comprehension: In Defense of the Psychological Reality of Syntax.David Pereplyotchik - 2011 - Croatian Journal of Philosophy 11 (1):31-72.
    In this paper, I argue for a modified version of what Devitt calls the Representational Thesis. According to RT, syntactic rules or principles are psychologically real, in the sense that they are represented in the mind/brain of every linguistically competent speaker/hearer. I present a range of behavioral and neurophysiological evidence for the claim that the human sentence processing mechanism constructs mental representations of the syntactic properties of linguistic stimuli. I then survey a range of psychologically plausible computational models of comprehension (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 999