Results for 'computational thing'

998 found
Order:
  1. The Nature of Computational Things.Franck Varenne - 2013 - In Frédéric Migayrou Brayer & Marie-Ange (eds.), Naturalizing Architecture. HYX Editions. pp. 96-105.
    Architecture often relies on mathematical models, if only to anticipate the physical behavior of structures. Accordingly, mathematical modeling serves to find an optimal form given certain constraints, constraints themselves translated into a language which must be homogeneous to that of the model in order for resolution to be possible. Traditional modeling tied to design and architecture thus appears linked to a topdown vision of creation, of the modernist, voluntarist and uniformly normative type, because usually (mono)functionalist. One available instrument of calculation/representation/prescription (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. What is this thing called Philosophy of Science? A computational topic-modeling perspective, 1934–2015.Christophe Malaterre, Jean-François Chartier & Davide Pulizzotto - 2019 - Hopos: The Journal of the International Society for the History of Philosophy of Science 9 (2):215-249.
    What is philosophy of science? Numerous manuals, anthologies or essays provide carefully reconstructed vantage points on the discipline that have been gained through expert and piecemeal historical analyses. In this paper, we address the question from a complementary perspective: we target the content of one major journal of the field—Philosophy of Science—and apply unsupervised text-mining methods to its complete corpus, from its start in 1934 until 2015. By running topic-modeling algorithms over the full-text corpus, we identified 126 key research topics (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  3. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and its (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer ethics content (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. F Things You (Probably) Didn't Know About Hexadecimal.Lloyd Strickland & Owain Daniel Jones - 2023 - The Mathematical Intelligencer 45:126-130.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally handled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. How to Do Things with Documents.Barry Smith - 2012 - Rivista di Estetica 50:179-198.
    This essay is a contribution to social ontology, drawing on the work of John Searle and of Hernando de Soto. At the center of the argument is the proposition advanced by de Soto in his Mystery of Capital to the effect that many of the entities which structure our contemporary social reality are entities which exist in virtue of the fact that there are (paper or digital) documents which support their existence. I here develop de Soto’s argument further, focusing specifically (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  9. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  10. An Intelligent Tutoring System for Teaching the 7 Characteristics for Living Things.Mohammed A. Hamed & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):31-35.
    Recently, due to the rapid progress of computer technology, researchers develop an effective computer program to enhance the achievement of the student in learning process, which is Intelligent Tutoring System (ITS). Science is important because it influences most aspects of everyday life, including food, energy, medicine, leisure activities and more. So learning science subject at school is very useful, but the students face some problem in learning it. So we designed an ITS system to help them understand this subject easily (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  11. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is pro- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Mark Weiser and the Origins of Ubiquitous Computing. [REVIEW]Dustin Gray - 2024 - Metascience.
    Download  
     
    Export citation  
     
    Bookmark  
  13. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Understanding Games as Played:Sketch for a first-person perspective for computer game analysis.Olli Tapio Leino - 2009 - Philosophy of Computer Games 2009 Proceedings.
    Researchers interested in player’s experience would assumedly, across disciplines, agree that the goal behind enquiries into player’s experience is to understand the how games’ features end up affecting the player’s experience. Much of the contemporary interdisciplinary research into player’s experience leans toward the empirical-scientific, in the forms psychology, sociology and cognitive science, to name a few. In such approaches, for example demonstrating correlation between physiological symptoms and an in-game event may amount to ‘understanding’. However, the experience of computer game play (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. David Wolpert on impossibility, incompleteness, the liar paradox, the limits of computation, a non-quantum mechanical uncertainty principle and the universe as computer—the ultimate theorem in Turing Machine Theory.Michael Starks - manuscript
    I have read many recent discussions of the limits of computation and the universe as computer, hoping to find some comments on the amazing work of polymath physicist and decision theorist David Wolpert but have not found a single citation and so I present this very brief summary. Wolpert proved some stunning impossibility or incompleteness theorems (1992 to 2008-see arxiv.org) on the limits to inference (computation) that are so general they are independent of the device doing the computation, and even (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Proofs are Programs: 19th Century Logic and 21st Century Computing.Philip Wadler - manuscript
    As the 19th century drew to a close, logicians formalized an ideal notion of proof. They were driven by nothing other than an abiding interest in truth, and their proofs were as ethereal as the mind of God. Yet within decades these mathematical abstractions were realized by the hand of man, in the digital stored-program computer. How it came to be recognized that proofs and programs are the same thing is a story that spans a century, a chase with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Wolpert, Chaitin and Wittgenstein on impossibility, incompleteness, the limits of computation, theism and the universe as computer-the ultimate Turing Theorem.Michael Starks - 2017 - Philosophy, Human Nature and the Collapse of Civilization Michael Starks 3rd Ed. (2017).
    I have read many recent discussions of the limits of computation and the universe as computer, hoping to find some comments on the amazing work of polymath physicist and decision theorist David Wolpert but have not found a single citation and so I present this very brief summary. Wolpert proved some stunning impossibility or incompleteness theorems (1992 to 2008-see arxiv.org) on the limits to inference (computation) that are so general they are independent of the device doing the computation, and even (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. In Defense of Contextual Vocabulary Acquisition: How to Do Things with Words in Context.William J. Rapaport - 2005 - In Anind Dey, Boicho Kokinov, David Leake & Roy Turner (eds.), Proceedings of the 5th International and Interdisciplinary Conference on Modeling and Using Context. Springer-Verlag Lecture Notes in Artificial Intelligence 3554. pp. 396--409.
    Contextual vocabulary acquisition (CVA) is the deliberate acquisition of a meaning for a word in a text by reasoning from context, where “context” includes: (1) the reader’s “internalization” of the surrounding text, i.e., the reader’s “mental model” of the word’s “textual context” (hereafter, “co-text” [3]) integrated with (2) the reader’s prior knowledge (PK), but it excludes (3) external sources such as dictionaries or people. CVA is what you do when you come across an unfamiliar word in your reading, realize that (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  19. Free Will, Temporal Asymmetry, and Computational Undecidability.Stuart T. Doyle - 2022 - Journal of Mind and Behavior 43 (4):305-321.
    One of the central criteria for free will is “Could I have done otherwise?” But because of a temporal asymmetry in human choice, the question makes no sense. The question is backward-looking, while human choices are forward-looking. At the time when any choice is actually made, there is as of yet no action to do otherwise. Expectation is the only thing to contradict (do other than). So the ability to do something not expected by the ultimate expecter, Laplace’s demon, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Wolpert, Chaitin and Wittgenstein on impossibility, incompleteness, the liar paradox, theism, the limits of computation, a non-quantum mechanical uncertainty principle and the universe as computer—the ultimate theorem in Turing Machine Theory (revised 2019).Michael Starks - 2019 - In Suicidal Utopian Delusions in the 21st Century -- Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2019 4th Edition Michael Starks. Las Vegas, NV USA: Reality Press. pp. 294-299.
    I have read many recent discussions of the limits of computation and the universe as computer, hoping to find some comments on the amazing work of polymath physicist and decision theorist David Wolpert but have not found a single citation and so I present this very brief summary. Wolpert proved some stunning impossibility or incompleteness theorems (1992 to 2008-see arxiv dot org) on the limits to inference (computation) that are so general they are independent of the device doing the computation, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when a society (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. ITS for teaching the 7 characteristics for living things.Hamad Mohamed & Bastami Bashhar - 2017 - International Journal of Advanced Research and Development 2 (1):31-36.
    Recently, due to the rapid progress of computer technology, researchers develop an effective computer program to enhance the achievement of the student in learning process, which is Intelligent Tutoring System (ITS). Science is important because it influences most aspects of everyday life, including food, energy, medicine, leisure activities and more. So learning science subject at school is very useful, but the students face some problem in learning it. So we designed an ITS system to help them understand this subject easily (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. An Evolutionary Argument for a Self-Explanatory, Benevolent Metaphysics.Ward Blondé - 2015 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 2 (2):143-166.
    In this paper, a metaphysics is proposed that includes everything that can be represented by a well-founded multiset. It is shown that this metaphysics, apart from being self-explanatory, is also benevolent. Paradoxically, it turns out that the probability that we were born in another life than our own is zero. More insights are gained by inducing properties from a metaphysics that is not self-explanatory. In particular, digital metaphysics is analyzed, which claims that only computable things exist. First of all, it (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Curious objects: How visual complexity guides attention and engagement.Zekun Sun & Chaz Firestone - 2021 - Cognitive Science: A Multidisciplinary Journal 45 (4):e12933.
    Some things look more complex than others. For example, a crenulate and richly organized leaf may seem more complex than a plain stone. What is the nature of this experience—and why do we have it in the first place? Here, we explore how object complexity serves as an efficiently extracted visual signal that the object merits further exploration. We algorithmically generated a library of geometric shapes and determined their complexity by computing the cumulative surprisal of their internal skeletons—essentially quantifying the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. UN SEMPLICE MODO PER TRATTARE LE GRANDEZZE INFINITE ED INFINITESIME.Yaroslav Sergeyev - 2015 - la Matematica Nella Società E Nella Cultura: Rivista Dell’Unione Matematica Italiana, Serie I 8:111-147.
    A new computational methodology allowing one to work in a new way with infinities and infinitesimals is presented in this paper. The new approach, among other things, gives the possibility to calculate the number of elements of certain infinite sets, avoids indeterminate forms and various kinds of divergences. This methodology has been used by the author as a starting point in developing a new kind of computer – the Infinity Computer – able to execute computations and to store in (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29. Structural Idealism.Eric Steinhart - 1994 - Idealistic Studies 24 (1):77-105.
    Structural idealism uses formal and computational techniques to describe an idealist ontology composed of God and a set of finite minds. A finite mind is a system of private intentional worlds. An intentional world is a connectionist hierarchy of intentional objects (propositions, concepts, sensible things, sensations). Intentional objects, similar to Leibnizian monads, are computing machines. To escape the egocentric predicament, Leibnizian relations of (in)compossibility exist between finite minds, linking them together into a constraint-satisfaction network, thereby coordinating their private intentional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Problems of representation I: nature and role.Dan Ryder - 2009 - In Sarah Robins, John Francis Symons & Paco Calvo (eds.), The Routledge Companion to Philosophy of Psychology. New York, NY: Routledge. pp. 233.
    Introduction There are some exceptions, which we shall see below, but virtually all theories in psychology and cognitive science make use of the notion of representation. Arguably, folk psychology also traffics in representations, or is at least strongly suggestive of their existence. There are many different types of things discussed in the psychological and philosophical literature that are candidates for representation-hood. First, there are the propositional attitudes – beliefs, judgments, desires, hopes etc. (see Chapters 9 and 17 of this volume). (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Human bounds: rationality for our species.Adam Morton - 2010 - Synthese 176 (1):5 - 21.
    Is there such a thing as bounded rationality? I first try to make sense of the question, and then to suggest which of the disambiguated versions might have answers. We need an account of bounded rationality that takes account of detailed contingent facts about the ways in which human beings fail to perform as we might ideally want to. But we should not think in terms of rules or norms which define good responses to an individual's limitations, but rather (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Mental Imagery and Creativity: Cognition, Observation and Realization.William Brant - 2013 - Saarbrücken, Germany: Akademikerverlag.
    Mental images, or envisioning things with your "mind's eye," are now studied via multiple levels of observation and involve computational neuroscience, robotics and many disciplines that complement philosophy and form integral parts of cognitive science. MENTAL IMAGERY AND CREATIVITY offers an historical analysis of the use of "mental images" in science. This book also gives many useful illustrations, depicting roles of imagery with 21st century technology, including the usage of imagery, fMRIs and internet connections, allowing people to control virtual (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant threat (...)
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  34. From agency to apperception: through kinaesthesia to cognition and creation.Susan A. J. Stuart - 2008 - Ethics and Information Technology 10 (4):255-264.
    My aim in this paper is to go some way towards showing that the maintenance of hard and fast dichotomies, like those between mind and body, and the real and the virtual, is untenable, and that technological advance cannot occur with being cognisant of its reciprocal ethical implications. In their place I will present a softer enactivist ontology through which I examine the nature of our engagement with technology in general and with virtual realities in particular. This softer ontology is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Generative AI and photographic transparency.P. D. Magnus - forthcoming - AI and Society:1-6.
    There is a history of thinking that photographs provide a special kind of access to the objects depicted in them, beyond the access that would be provided by a painting or drawing. What is included in the photograph does not depend on the photographer’s beliefs about what is in front of the camera. This feature leads Kendall Walton to argue that photographs literally allow us to see the objects which appear in them. Current generative algorithms produce images in response to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Information ethics, its nature and scope.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (2):21-36.
    In recent years, “Information Ethics” (IE) has come to mean different things to different researchers working in a variety of disciplines, including computer ethics, business ethics, medical ethics, computer science, the philosophy of information, social epistemology and library and information science. Using an ontocentric approach, this paper seeks to define the parameters of IE and thereby increase our understanding of the moral challenges associated with Information Communication Technologies.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  37. The epistemic superiority of experiment to simulation.Sherrilyn Roush - 2018 - Synthese 195 (11):4883-4906.
    This paper defends the naïve thesis that the method of experiment has per se an epistemic superiority over the method of computer simulation, a view that has been rejected by some philosophers writing about simulation, and whose grounds have been hard to pin down by its defenders. I further argue that this superiority does not come from the experiment’s object being materially similar to the target in the world that the investigator is trying to learn about, as both sides of (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  38. The epistemic superiority of experiment to simulation.Sherrilyn Roush - 2018 - Synthese 195 (11):4883-4906.
    This paper defends the naïve thesis that the method of experiment has per se an epistemic superiority over the method of computer simulation, a view that has been rejected by some philosophers writing about simulation, and whose grounds have been hard to pin down by its defenders. I further argue that this superiority does not come from the experiment’s object being materially similar to the target in the world that the investigator is trying to learn about, as both sides of (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  39. Legitimacy, Authority, and the Political Value of Explanations.Seth Lazar - manuscript
    Here is my thesis (and the outline of this paper). Increasingly secret, complex and inscrutable computational systems are being used to intensify existing power relations, and to create new ones (Section II). To be all-things-considered morally permissible, new, or newly intense, power relations must in general meet standards of procedural legitimacy and proper authority (Section III). Legitimacy and authority constitutively depend, in turn, on a publicity requirement: reasonably competent members of the political community in which power is being exercised (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Computationalism.Eric Dietrich - 1990 - Social Epistemology 4 (2):135-154.
    This paper argues for a noncognitiveist computationalism in the philosophy of mind. It further argues that both humans and computers have intentionality, that is, their mental states are semantical -- they are about things in their worlds.
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  41. The psychopathology of metaphysics.Billon Alexandre - 2024 - Metaphilosophy 1 (01):1-28.
    According to a common philosophical intuition, the deep nature of things is hidden from us, and the world as we know it through perception and science is somehow shallow and lacking in reality. For all we knwo, the intuition goes, we could be living in a cave facing shadows, in a dream or even in a computer simulation, This “intuition of unreality” clashes with a strong, but perhaps more naive, intuition to the effect that the world as we know it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Exceptionalist naturalism: human agency and the causal order.John Turri - 2018 - Quarterly Journal of Experimental Psychology 71 (2):396-410.
    This paper addresses a fundamental question in folk metaphysics: how do we ordinarily view human agency? According to the transcendence account, we view human agency as standing outside of the causal order and imbued with exceptional powers. According to a naturalistic account, we view human agency as subject to the same physical laws as other objects and completely open to scientific investigation. According to exceptionalist naturalism, the truth lies somewhere in between: we view human agency as fitting broadly within the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Mechanistic Explanation in Psychology.Mark Povich - forthcoming - In Hank Stam & Huib Looren De Jong (eds.), The SAGE Handbook of Theoretical Psychology. (Eds.) Hank Stam and Huib Looren de Jong. Sage.
    Philosophers of psychology debate, among other things, which psychological models, if any, are (or provide) mechanistic explanations. This should seem a little strange given that there is rough consensus on the following two claims: 1) a mechanism is an organized collection of entities and activities that produces, underlies, or maintains a phenomenon, and 2) a mechanistic explanation describes, represents, or provides information about the mechanism producing, underlying, or maintaining the phenomenon to be explained (i.e. the explanandum phenomenon) (Bechtel and Abrahamsen (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Measuring the intelligence of an idealized mechanical knowing agent.Samuel Alexander - 2020 - Lecture Notes in Computer Science 12226.
    We define a notion of the intelligence level of an idealized mechanical knowing agent. This is motivated by efforts within artificial intelligence research to define real-number intelligence levels of compli- cated intelligent systems. Our agents are more idealized, which allows us to define a much simpler measure of intelligence level for them. In short, we define the intelligence level of a mechanical knowing agent to be the supremum of the computable ordinals that have codes the agent knows to be codes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Free Will and the Bounds of the Self.Joshua Knobe & Shaun Nichols - 2011 - In Robert Kane (ed.), Oxford Handbook of Free Will. Oxford University Press.
    If you start taking courses in contemporary cognitive science, you will soon encounter a particular picture of the human mind. This picture says that the mind is a lot like a computer. Specifically, the mind is made up of certain states and certain processes. These states and processes interact, in accordance with certain general rules, to generate specific behaviors. If you want to know how those states and processes got there in the first place, the only answer is that they (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  46. Bayesian perspectives on mathematical practice.James Franklin - 2020 - Handbook of the History and Philosophy of Mathematical Practice.
    Mathematicians often speak of conjectures as being confirmed by evidence that falls short of proof. For their own conjectures, evidence justifies further work in looking for a proof. Those conjectures of mathematics that have long resisted proof, such as the Riemann hypothesis, have had to be considered in terms of the evidence for and against them. In recent decades, massive increases in computer power have permitted the gathering of huge amounts of numerical evidence, both for conjectures in pure mathematics and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Psychopower and Ordinary Madness: Reticulated Dividuals in Cognitive Capitalism.Ekin Erkan - 2019 - Cosmos and History 15 (1):214-241.
    Despite the seemingly neutral vantage of using nature for widely-distributed computational purposes, neither post-biological nor post-humanist teleology simply concludes with the real "end of nature" as entailed in the loss of the specific ontological status embedded in the identifier "natural." As evinced by the ecological crises of the Anthropocene—of which the 2019 Brazil Amazon rainforest fires are only the most recent—our epoch has transfixed the “natural order" and imposed entropic artificial integration, producing living species that become “anoetic,” made to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. It Does So: Review of Jerry Fodor, The Mind Doesn't Work That Way. [REVIEW]Eric Dietrich - 2001 - AI Magazine 22 (4):121-24.
    Objections to AI and computational cognitive science are myriad. Accordingly, there are many different reasons for these attacks. But all of them come down to one simple observation: humans seem a lot smarter that computers -- not just smarter as in Einstein was smarter than I, or I am smarter than a chimpanzee, but more like I am smarter than a pencil sharpener. To many, computation seems like the wrong paradigm for studying the mind. (Actually, I think there are (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. M2M Networking Architecture for Data Transmission and Routing.Soujanya Ambala - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):59-63.
    We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server free and router free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases routing and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed based on small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. CRITIQUE OF IMPURE REASON: Horizons of Possibility and Meaning.Steven James Bartlett - 2021 - Salem, USA: Studies in Theory and Behavior.
    PLEASE NOTE: This is the corrected 2nd eBook edition, 2021. ●●●●● _Critique of Impure Reason_ has now also been published in a printed edition. To reduce the otherwise high price of this scholarly, technical book of nearly 900 pages and make it more widely available beyond university libraries to individual readers, the non-profit publisher and the author have agreed to issue the printed edition at cost. ●●●●● The printed edition was released on September 1, 2021 and is now available through (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 998