Results for 'Swarm Deterrence'

118 found
Order:
  1.  64
    The AI Revolution in Deterrence Theory: 10 Groundbreaking Concepts Reshaping Global Security.Yu Chen - manuscript
    This article explores the transformative impact of artificial intelligence on deterrence theory, introducing 10 groundbreaking concepts that are reshaping global security dynamics. As traditional deterrence strategies face challenges in an increasingly complex and interconnected world, these innovative approaches leverage AI, complex systems theory, and emerging technologies to create more sophisticated and adaptive deterrence mechanisms. From Chaos Deterrence, which harnesses unpredictability, to Möbius Deterrence, which blurs the lines between offense and defense, these concepts represent a paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Taking Deterrence Seriously: The Wide-Scope Deterrence Theory of Punishment.Lee Hsin-wen - 2017 - Criminal Justice Ethics 36 (1):2-24.
    A deterrence theory of punishment holds that the institution of criminal punishment is morally justified because it serves to deter crime. Because the fear of external sanction is an important incentive in crime deterrence, the deterrence theory is often associated with the idea of severe, disproportionate punishment. An objection to this theory holds that hope of escape renders even the severest punishment inapt and irrelevant. -/- This article revisits the concept of deterrence and defend a more (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Deterrent Punishment in Utilitarianism.Steven Sverdlik - manuscript
    This is a presentation of the utilitarian approach to punishment. It is meant for students. A note added in July, 2022 advises the reader about the author's current views on some topics in the paper. The first section discusses Bentham's psychological hedonism. The second briefly criticizes it. The third section explains abstractly how utilitarianism would determine of the right amount of punishment. The fourth section applies the theory to some cases, and brings out how utilitarianism could favor punishments more or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  57
    (1 other version)The Permissibility of Deterrence.Steven Sverdlik - 2018 - In Christian Seidel (ed.), Consequentialism: New Directions, New Problems. Oxford/New York: Oxford University Press.
    In this paper I explore the degree to which the most plausible versions of a Kantian approach to punishment differ from plausible versions of a consequentialist approach with regard to the permissibility of deterrence. I begin by examining the Formula of Humanity. Perhaps surprisingly, I show that the most plausible statement of this principle does not even mention the idea of treating people merely as a means. The other crucial claim in that principle—that we must treat people as ends—is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. "Deterrence,".S. M. Amadae - 2015 - In Prisoners of Reason: Game Theory and Neoliberal Political Economy. New York: Cambridge University Press. pp. 99-140.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  6. The Self-Swarm of Artemis: Emily Dickinson as Bee/Hive/Queen.Joshua M. Hall - 2022 - Transactions of the Charles S. Peirce Society 58 (2):167-187.
    Despite the ubiquity of bees in Dickinson’s work, most interpreters denigrate her nature poems. But following several recent scholars, I identify Nietzschean/Dionysian overtones in the bee poems and suggest the figure of bees/hive/queen illuminates as feminist key to her corpus. First, (a) the bee’s sting represents martyred death; (b) its gold, immortality; (c) its tongue, the “lesbian phallus”; (d) its wings, poetic power; (e) its buzz, poetic melody, and (f) its organism, a joyful Dionysian Susan (her sister-in-law and love interest) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Swarms Are Hell: Warfare as an Anti-Transhuman Choice.Woody Evans - 2013 - Journal of Evolution and Technology 23 (1):56-60.
    The use of advanced technologies, even of so-called transhuman technology, does not make militaries transhuman. Transhumanism includes dimensions of ethics that are themselves in direct conflict with many transhuman capabilities of soldiers in warfare. The use of advanced weapons of mass destruction represents an anti-humanism that undermines the modern, open, and high-tech nation state.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  75
    Swarm of particles moving at the speed of light in quantum entanglement: The Origin of conscious World.Zheng Huang - manuscript
    This paper primarily investigates the following questions: The first question:What is the basic structure of consciousness? I proposed that objects moving at the speed of light form the fundamental structure of consciousness. The second question:How is the unified field of the conscious self formed? The study suggests that countless particles moving at the speed of light, through quantum entanglement, form the unified field of each individual's consciousness. Each individual's unified field consists of countless particles originating from a source, which can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Human Swarm: How Our Societies Arise, Thrive, and Fall. [REVIEW]Hugh Desmond - 2020 - Quarterly Review of Biology 95:341-341.
    The rise and fall of societies has traditionally been subject matter for history and sociology, but with The Human Swarm, the author establishes the human society as a legitimate object of study for evolutionary biologists. Societies are different from groups of cooperating individuals in that they have a social identity that sets the terms for group membership. In ant colonies, identity is manifested by a unique scent; in whale pods, by unique sounds; and in human groups, by a wide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Unsystematic Vitality: From Early Modern Beeswarms to Contemporary Swarm Intelligence.Sylvie Kleiman-Lafon & Charles T. Wolfe - 2021 - In Peter Fratzl, Michael Friedman, Karin Krauthausen & Wolfgang Schäffner (eds.), Active Materials. De Gruyter. pp. 259-298.
    The eighteenth century was the century of self-organization, but also that of materialism, inasmuch as it was then that certain thinkers proclaimed themselves to be materialists (rather than just being labelled as such by enemies of various sorts). If one seeks to read these two features – one hesitates to call them ‘facts’ or ‘events’ – together, one arrives rather quickly at an influential metaphor, the beeswarm. But a metaphor of or for what? Irreducible organic unity, most broadly – spelled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Driving and Deterrent Factors Affecting Organic Food Consumption in Vietnam.Loan H. Tran, Barbara Freytag-Leyer, Angelika Ploeger & Thomas Krikser - 2019 - Journal of Economics, Business and Management 7 (4):137-142.
    This study aims to determine driving factors significantly influencing the purchase intention and to identify impediments creating the intention –behavior gap regarding organic food consumption in Vietnam. The chosen driving factors affecting the organic food purchase intention in this study are health benefits, environmental awareness, and social norms, whereas trust, price, and convenience as well as availability are investigated as deterrent factors of the link between intention and behavior. A structured online questionnaire with snow-balling sampling method was distributed to collect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Deontology and deterrence for free will deniers.Benjamin Vilhauer - 2019 - In Elizabeth Shaw, Derk Pereboom & Gregg D. Caruso (eds.), Free Will Skepticism in Law and Society: Challenging Retributive Justice. New York, NY: Cambridge University Press.
    Download  
     
    Export citation  
     
    Bookmark  
  13. Retaliation Rationalized: Gauthier's Solution to the Deterrence Dilemma.Duncan MacIntosh - 1991 - Pacific Philosophical Quarterly 72 (1):9-32.
    Gauthier claims: (1) a non-maximizing action is rational if it maximized to intend it. If one intended to retaliate in order to deter an attack, (2) retaliation is rational, for it maximized to intend it. I argue that even on sympathetic theories of intentions, actions and choices, (1) is incoherent. But I defend (2) by arguing that an action is rational if it maximizes on preferences it maximized to adopt given one's antecedent preferences. (2) is true because it maximized to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. The Permissibility of Deterrence. Steven - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  15. Facing the Consequences.Nathan Hanna - 2014 - Criminal Law and Philosophy 8 (3):589-604.
    According to deterrence justifications of legal punishment, legal punishment is justified at least in part because it deters offenses. These justifications rely on important empirical assumptions, e.g., that non-punitive enforcement can't deter or that it can't deter enough. I’ll challenge these assumptions and argue that extant deterrence justifications of legal punishment fail. In the process, I examine contemporary deterrence research and argue that it provides no support for these justifications.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  16. Military Intervention in Interstate Armed Conflicts.Cécile Fabre - 2023 - Social Philosophy and Policy 40 (2):431-454.
    Suppose that state A attacks state D without warrant. The ensuing military conflict threatens international peace and security. State D (I assume) has a justification for defending itself by means of military force. Do third parties have a justification for intervening in that conflict by such means? To international public lawyers, the well-rehearsed and obvious answer is “yes.” Threats to international peace and security provide one of two exceptions to the legal and moral prohibition (as set out in Article 2[4] (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  23
    Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled WSNs, utilizing advanced optimization techniques (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. (1 other version)Consequentialist Theories of Punishment.Hsin-Wen Lee - 2022 - In Matthew C. Altman (ed.), The Palgrave Handbook on the Philosophy of Punishment. Palgrave-Macmillan. pp. 149-169.
    In this chapter, I consider contemporary consequentialist theories of punishment. Consequentialist theories of punishment look to the consequences of punishment to justify the institution of punishment. Two types of theories fall into this category—teleology and aggregationism. I argue that teleology is implausible as it is based on a problematic assumption about the fundamental value of criminal punishment, and that aggregationism provides a more reasonable alternative. Aggregationism holds that punishment is morally justified because it is an institution that helps society to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Worst-Case Planning: Political Decision Making in the West.S. M. Amadae - 2020 - In Thomas Grossboelting & Stefan Lehr (eds.), Politisches Entscheiden im Kalten Krieg. pp. 249-271.
    The goal of this essay is to explore "the highly contested nature of [decision-making through adopting] a historically comparative and interdisciplinary approach." Internalist history of game theory treats decision theory as a science of making choices to maximize expected gain. Game theory is applied to nuclear deterrence and military strategy, building markets and designing institutions, analyzing collective action, developing jurisprudence, and addressing crime and punishment. This essay draws on recent historiography of Cold War decision-making to draw into focus the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Programming the Emergence in Morphogenetically Architected Complex Systems.Franck Varenne, Pierre Chaigneau, Jean Petitot & René Doursat - 2015 - Acta Biotheoretica 63 (3):295-308.
    Large sets of elements interacting locally and producing specific architectures reliably form a category that transcends the usual dividing line between biological and engineered systems. We propose to call them morphogenetically architected complex systems (MACS). While taking the emergence of properties seriously, the notion of MACS enables at the same time the design (or “meta-design”) of operational means that allow controlling and even, paradoxically, programming this emergence. To demonstrate our claim, we first show that among all the self-organized systems studied (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Disuasión y Castogo desde una Perspectiva Lockeana.Nicolas Maloberti - 2011 - Revista de Ciencia Politica 31 (1).
    This article formulates a deterrence theory of punishment based on Lockean premises. Following authors such as Warren Quinn and Daniel Farrell, it is claimed that a justification for the right to punish must be built upon the recognition of the importance of a right to issue retaliatory threats. Contrary to those authors, however, the articulation of such recognition is made within a Lockean theory of individual rights. This allows us to appreciate the specific role deterrence has in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  53
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  69
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by modern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The consequentialist problem with prepunishment.Preston Greene - 2021 - Thought: A Journal of Philosophy 10 (3):199-208.
    This paper targets a nearly universal assumption in the philosophical literature: that prepunishment is unproblematic for consequentialists. Prepunishment threats do not deter, as deterrence is traditionally conceived. In fact, a pure prepunishment legal system would tend to increase the criminal disposition of the grudgingly compliant. This is a serious problem since, from many perspectives, but especially from a consequentialist one, a primary purpose of punishment is deterrence. I analyze the decision theory behind pre and postpunishments, which helps clarify (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Fire and Forget: A Moral Defense of the Use of Autonomous Weapons in War and Peace.Duncan MacIntosh - 2021 - In Jai Galliott, Duncan MacIntosh & Jens David Ohlin (eds.), Lethal Autonomous Weapons: Re-Examining the Law and Ethics of Robotic Warfare. New York: Oxford University Press. pp. 9-23.
    Autonomous and automatic weapons would be fire and forget: you activate them, and they decide who, when and how to kill; or they kill at a later time a target you’ve selected earlier. Some argue that this sort of killing is always wrong. If killing is to be done, it should be done only under direct human control. (E.g., Mary Ellen O’Connell, Peter Asaro, Christof Heyns.) I argue that there are surprisingly many kinds of situation where this is false and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The Ecumenicity of Ugandan Martyrologic Events.Emmanuel Orok Duke - 2020 - Bogoslovnic Vestnik 80 (4).
    When people are united in their suffering for a common cause, that which binds them together is always stronger than their differences. The bond is even sturdier when religious motives define their common convictions. For this reason, during martyrdom, those who are persecuted create peculiar reli - gious identity through their common belief in God. This identity generates a socializing bond which makes them resolute in their united witness to the su - bject of their faith. This was the case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Preference-Revision and the Paradoxes of Instrumental Rationality.Duncan MacIntosh - 1992 - Canadian Journal of Philosophy 22 (4):503-529.
    To the normal reasons that we think can justify one in preferring something, x (namely, that x has objectively preferable properties, or has properties that one prefers things to have, or that x's obtaining would advance one's preferences), I argue that it can be a justifying reason to prefer x that one's very preferring of x would advance one's preferences. Here, one prefers x not because of the properties of x, but because of the properties of one's having the preference (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  28. Contractualism and Punishment.Hon-Lam Li - 2015 - Criminal Justice Ethics 34 (2):177-209.
    T. M. Scanlon’s contractualism is a meta-ethical theory that explains moral motivation and also provides a conception of how to carry out moral deliberation. It supports non-consequentialism – the theory that both consequences and deontological considerations are morally significant in moral deliberation. Regarding the issue of punishment, non-consequentialism allows us to take account of the need for deterrence as well as principles of fairness, justice, and even desert. Moreover, Scanlonian contractualism accounts for permissibility in terms of justifiability: An act (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29. Liberal democracy and nuclear despotism: two ethical foreign policy dilemmas.Thomas E. Doyle - 2013 - Ethics and Global Politics 6 (3):155-174.
    This article advances a critical analysis of John Rawls’s justification of liberal democratic nuclear deterrence in the post-Cold War era as found in The Law of Peoples. Rawls’s justification overlooked how nuclear-armed liberal democracies are ensnared in two intransigent ethical dilemmas: one in which the mandate to secure liberal constitutionalism requires both the preservation and violation of important constitutional provisions in domestic affairs, and the other in which this same mandate requires both the preservation and violation of the liberal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Reactive Sentiments and the Justification of Punishment.Andrew Engen - 2015 - Philosophy and Public Issues - Filosofia E Questioni Pubbliche 5 (1):173-205.
    Traditional justifications of punishment, deterrence theory and retributivism, are subject to counterexamples that show that they do not explain why generally we have positive reason to punish those who commit serious crimes. Nor do traditional views sufficiently explain why criminals cannot reasonably object to punishment on the grounds that it deprives them of goods to which they are usually entitled. I propose an alternative justification of punishment, grounded in its blaming function. According to the “reactive theory,” punishment is justified (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Ontology and the Future of Dental Research Informatics.Barry Smith, Louis J. Goldberg, Alan Ruttenberg & Michael Glick - 2010 - Journal of the American Dental Association 141 (10):1173-75.
    How do we find what is clinically significant in the swarms of data being generated by today’s diagnostic technologies? As electronic records become ever more prevalent – and digital imaging and genomic, proteomic, salivaomics, metabalomics, pharmacogenomics, phenomics and transcriptomics techniques become commonplace – fdifferent clinical and biological disciplines are facing up to the need to put their data houses in order to avoid the consequences of an uncontrolled explosion of different ways of describing information. We describe a new strategy to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Locke on individuation and the corpuscular basis of kinds.Dan Kaufman - 2007 - Philosophy and Phenomenological Research 75 (3):499–534.
    In a well-known paper, Reginald Jackson expresses a sentiment not uncommon among readers of Locke: “Among the merits of Locke’s Essay…not even the friendliest critic would number consistency.”2 This unflattering opinion of Locke is reiterated by Maurice Mandelbaum: “Under no circumstances can [Locke] be counted among the clearest and most consistent of philosophers.”3 The now familiar story is that there are innumerable inconsistencies and internal problems contained in Locke’s Essay. In fact, it is probably safe to say that there is (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  34. HeX and the single anthill: playing games with Aunt Hillary.J. M. Bishop, S. J. Nasuto, T. Tanay, E. B. Roesch & M. C. Spencer - 2016 - In Vincent C. Müller (ed.), Fundamental Issues of Artificial Intelligence. Cham: Springer. pp. 367-389.
    In a reflective and richly entertaining piece from 1979, Doug Hofstadter playfully imagined a conversation between ‘Achilles’ and an anthill (the eponymous ‘Aunt Hillary’), in which he famously explored many ideas and themes related to cognition and consciousness. For Hofstadter, the anthill is able to carry on a conversation because the ants that compose it play roughly the same role that neurons play in human languaging; unfortunately, Hofstadter’s work is notably short on detail suggesting how this magic might be achieved1. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  51
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  42
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify cyberbullying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  41
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. How Is Constitutive Russellian Monism (or Pansychism) Better than Dualism?Adam Pautz - manuscript
    This is a reply to Luke Roelof's comments (2017) on my paper "A Dilemma for Russellian Monists about Consciousness" (2015). On both Russellian monism and dualism, experiences are distinct from neural-functional states and they are correlated with some neural-functional states and not others. The only difference between them concerns the status of the extra-logical principles linking experiences with their neural-functional correlates (e. g. increasing S1 firing rates results in increasing pain): Russellian monists hold that they are a priori and necessary, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. The significances of bacterial colony patterns.James A. Shapiro - 1995 - Bioessays 17 (7):597-607.
    Bacteria do many things as organized populations. We have recently learned much about the molecular basis of intercellular communication among prokaryotes. Colonies display bacterial capacities for multicellular coordination which can be useful in nature where bacteria predominantly grow as films, chains, mats and colonies. E. coli colonies are organized into differentiated non-clonal populations and undergo complex morphogenesis. Multicellularity regulates many aspects of bacterial physiology, including DNA rearrangement systems. In some bacterial species, colony development involves swarming (active migration of cell groups). (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  46
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Natural Genome Editing from a Biocommunicative Perspective.Guenther Witzany - 2011 - Biosemiotics 4 (3):349-368.
    Natural genome editing from a biocommunicative perspective is the competent agent-driven generation and integration of meaningful nucleotide sequences into pre-existing genomic content arrangements, and the ability to (re-)combine and (re-)regulate them according to context-dependent (i.e. adaptational) purposes of the host organism. Natural genome editing integrates both natural editing of genetic code and epigenetic marking that determines genetic reading patterns. As agents that edit genetic code and epigenetically mark genomic structures, viral and subviral agents have been suggested because they may be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Gaming the Attention Economy.Daniel Estrada & Jon Lawhead - 2013 - In Pietro Michelucci (ed.), Handbook of Human Computation. Springer Verlag. pp. 961-978.
    The future of human computation benefits from examining tasks that agents already perform and designing environments to give those tasks computational significance. We call this natural human computation. We consider the possible future of NHC through the lens of Swarm!, an application under development for Google Glass. Swarm! motivates users to compute the solutions to a class of economic optimization problems by engaging the attention dynamics of crowds. We argue that anticipating and managing economies of attention provides one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Computable Rationality, NUTS, and the Nuclear Leviathan.S. M. Amadae - 2018 - In Daniel Bessner & Nicolas Guilhot (eds.), The Decisionist Imagination: Democracy, Sovereignty and Social Science in the 20th Century.
    This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it across the globe. Nuclearized sovereignty depends on a hybrid form of power encompassing human decision-makers in a hierarchical chain of command, and all of the technical and computerized functions necessary to maintain command and control at every moment of the sovereign's existence: this (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44.  32
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A New Societal Self-Defense Theory of Punishment—The Rights-Protection Theory.Hsin-Wen Lee - 2018 - Philosophia 46 (2):337-353.
    In this paper, I propose a new self-defense theory of punishment, the rights-protection theory. By appealing to the interest theory of right, I show that what we call “the right of self-defense” is actually composed of the right to protect our basic rights. The right of self-defense is not a single, self-standing right but a group of derivative rights justified by their contribution to the protection of the core, basic rights. Thus, these rights of self-defense are both justified and constrained (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Corporate Essence and Identity in Criminal Law.Mihailis E. Diamantis - 2018 - Journal of Business Ethics 154 (4):955-966.
    How can we know whether we are punishing the same corporation that committed some past crime? Though central to corporate criminal justice, legal theorists and philosophers have yet to address the basic question of how corporate identity persists through time. Simple cases, where crime and punishment are close in time and the corporation has changed little, can mislead us into thinking an answer is always easy to come by. The issue becomes more complicated when corporate criminals undergo any number of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Holding Responsible in the African Tradition: Reconciliation Applied to Punishment, Compensation, and Trials.Thaddeus Metz - 2023 - In Maximilian Kiener (ed.), The Routledge Handbook of Philosophy of Responsibility. Abingdon, Oxon: Routledge. pp. 380-392.
    When it comes to how to hold people responsible for wrongdoing, much of the African philosophical tradition focuses on reconciliation as a final aim. This essay expounds an interpretation of reconciliation meant to have broad appeal, and then draws out its implications for responsibility in respect to three matters. First, when it comes to criminal justice, prizing reconciliation entails that offenders should be held responsible to “clean up their own mess,” i.e., to reform their characters and compensate victims in ways (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Anti-terrorism politics and the risk of provoking.Franz Dietrich - 2014 - Journal of Theoretical Politics 3 (26):405-41.
    Tough anti-terrorism policies are often defended by focusing on a fixed minority of the population who prefer violent outcomes, and arguing that toughness reduces the risk of terrorism from this group. This reasoning implicitly assumes that tough policies do not increase the group of 'potential terrorists', i.e., of people with violent preferences. Preferences and their level of violence are treated as stable, exogenously fixed features. To avoid this unrealis- tic assumption, I formulate a model in which policies can 'brutalise' or (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Why Reconciliation Requires Punishment but Not Forgiveness.Thaddeus Metz - 2022 - In Krisanna M. Scheiter & Paula Satne (eds.), Conflict and Resolution: The Ethics of Forgiveness, Revenge, and Punishment. Switzerland: Springer Nature. pp. 265-281.
    Adherents to reconciliation, restorative justice, and related approaches to dealing with social conflict are well known for seeking to minimize punishment, in favor of offenders hearing out victims, making an apology, and effecting compensation for wrongful harm as well as victims forgiving offenders and accepting their reintegration into society. In contrast, I maintain that social reconciliation and similar concepts in fact characteristically require punishment but do not require forgiveness. I argue that a reconciliatory response to crime that includes punitive disavowal (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. Assertions, Handicaps, and Social Norms.Peter J. Graham - 2020 - Episteme 17 (3):349-363.
    How should we undertand the role of norms—especially epistemic norms—governing assertive speech acts? Mitchell Green (2009) has argued that these norms play the role of handicaps in the technical sense from the animal signals literature. As handicaps, they then play a large role in explaining the reliability—and so the stability (the continued prevalence)—of assertive speech acts. But though norms of assertion conceived of as social norms do indeed play this stabilizing role, these norms are best understood as deterrents and not (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 118