Results for 'computing power'

967 found
Order:
  1. On Computable Numbers, Non-Universality, and the Genuine Power of Parallelism.Nancy Salay & Selim Akl - 2015 - International Journal of Unconventional Computing 11 (3-4):283-297.
    We present a simple example that disproves the universality principle. Unlike previous counter-examples to computational universality, it does not rely on extraneous phenomena, such as the availability of input variables that are time varying, computational complexity that changes with time or order of execution, physical variables that interact with each other, uncertain deadlines, or mathematical conditions among the variables that must be obeyed throughout the computation. In the most basic case of the new example, all that is used is a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics.Leigh Tesfatsion & Kenneth L. Judd (eds.) - 2006 - Amsterdam, The Netherlands: Elsevier.
    The explosive growth in computational power over the past several decades offers new tools and opportunities for economists. This handbook volume surveys recent research on Agent-based Computational Economics (ACE), the computational study of economic processes modeled as open-ended dynamic systems of interacting agents. Empirical referents for “agents” in ACE models can range from individuals or social groups with learning capabilities to physical world features with no cognitive function. Topics covered include: learning; empirical validation; network economics; social dynamics; financial markets; (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. Computer Simulations in Science and Engineering. Concept, Practices, Perspectives.Juan Manuel Durán - 2018 - Springer.
    This book addresses key conceptual issues relating to the modern scientific and engineering use of computer simulations. It analyses a broad set of questions, from the nature of computer simulations to their epistemological power, including the many scientific, social and ethics implications of using computer simulations. The book is written in an easily accessible narrative, one that weaves together philosophical questions and scientific technicalities. It will thus appeal equally to all academic scientists, engineers, and researchers in industry interested in (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  5. Computable Rationality, NUTS, and the Nuclear Leviathan.S. M. Amadae - 2018 - In Daniel Bessner & Nicolas Guilhot (eds.), The Decisionist Imagination: Democracy, Sovereignty and Social Science in the 20th Century.
    This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it across the globe. Nuclearized sovereignty depends on a hybrid form of power encompassing human decision-makers in a hierarchical chain of command, and all of the technical and computerized functions necessary to maintain command and control at every moment of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Platonic Computer— the Universal Machine That Bridges the “Inverse Explanatory Gap” in the Philosophy of Mind.Simon X. Duan - 2022 - Filozofia i Nauka 10:285-302.
    The scope of Platonism is extended by introducing the concept of a “Platonic computer” which is incorporated in metacomputics. The theoretical framework of metacomputics postulates that a Platonic computer exists in the realm of Forms and is made by, of, with, and from metaconsciousness. Metaconsciousness is defined as the “power to conceive, to perceive, and to be self-aware” and is the formless, con-tentless infinite potentiality. Metacomputics models how metaconsciousness generates the perceived actualities including abstract entities and physical and nonphysical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. (1 other version)Computer models and the evidence of anthropogenic climate change: An epistemology of variety-of-evidence inferences and robustness analysis.Martin Vezer - 2016 - Computer Models and the Evidence of Anthropogenic Climate Change: An Epistemology of Variety-of-Evidence Inferences and Robustness Analysis MA Vezér Studies in History and Philosophy of Science 56:95-102.
    To study climate change, scientists employ computer models, which approximate target systems with various levels of skill. Given the imperfection of climate models, how do scientists use simulations to generate knowledge about the causes of observed climate change? Addressing a similar question in the context of biological modelling, Levins (1966) proposed an account grounded in robustness analysis. Recent philosophical discussions dispute the confirmatory power of robustness, raising the question of how the results of computer modelling studies contribute to the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8. Agent-Based Computational Economics: A Constructive Approach to Economic Theory.Leigh Tesfatsion - 2006 - In Leigh Tesfatsion & Kenneth L. Judd (eds.), Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics. Amsterdam, The Netherlands: Elsevier.
    Economies are complicated systems encompassing micro behaviors, interaction patterns, and global regularities. Whether partial or general in scope, studies of economic systems must consider how to handle difficult real-world aspects such as asymmetric information, imperfect competition, strategic interaction, collective learning, and the possibility of multiple equilibria. Recent advances in analytical and computational tools are permitting new approaches to the quantitative study of these aspects. One such approach is Agent-based Computational Economics (ACE), the computational study of economic processes modeled as dynamic (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  9. Genome Informatics: The Role of DNA in Cellular Computations.James A. Shapiro - 2006 - Biological Theory 1 (3):288-301.
    Cells are cognitive entities possessing great computational power. DNA serves as a multivalent information storage medium for these computations at various time scales. Information is stored in sequences, epigenetic modifications, and rapidly changing nucleoprotein complexes. Because DNA must operate through complexes formed with other molecules in the cell, genome functions are inherently interactive and involve two-way communication with various cellular compartments. Both coding sequences and repetitive sequences contribute to the hierarchical systemic organization of the genome. By virtue of nucleoprotein (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  10.  81
    AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Computers, Persons, and the Chinese Room. Part 2: Testing Computational Cognitive Science.Ricardo Restrepo - 2012 - Journal of Mind and Behavior 33 (3):123-140.
    This paper is a follow-up of the first part of the persons reply to the Chinese Room Argument. The first part claims that the mental properties of the person appearing in that argument are what matter to whether computational cognitive science is true. This paper tries to discern what those mental properties are by applying a series of hypothetical psychological and strengthened Turing tests to the person, and argues that the results support the thesis that the Man performing the computations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed a chatbot automation (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  13. The Universe as a Computer Game, from Virtual to Actual Reality.Alfred Driessen - 2018 - Scientia et Fides 6 (1):31-52.
    From the very beginning of ancient Greek philosophy up to the present day a puzzling correlation is found between rationality and reality. In this study this relation is examined with emphasis on the philosophical tradition of Aristotle and Aquinas. A comparison is made with the virtual reality created by computers and actual reality of our universe. The view expressed in the scientific neopositivism of Jordan and Mach is found to be an adequate approach to avoid contradictions in the interpretation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Komputer, Kecerdasan Buatan dan Internet: Filsafat Hubert L. Dreyfus tentang Produk Industri 3.0 dan Industri 4.0 (Computer, Artificial Intelligence and Internet: Dreyfus’s Philosophy on the Product of 3.0 and 4.0 Industries).Zainul Maarif - 2019 - Prosiding Paramadina Research Day.
    The content of this paper is an elaboration of Hubert L. Dreyfus’s philosophical critique of Artificial Intelligence (AI), computers and the internet. Hubert L. Dreyfus (1929-2017) is Ua SA philosopher and alumni of Harvard University who teach at the Massachusetts Institute of Technology (MIT) and University of California, Berkeley. He is a phenomenological philosopher who criticize computer researchers and the artificial intelligence community. In 1965, Dreyfus wrote an article for Rand Corporation titled “Alchemy and Artificial Intelligence” which criticizes the masterminds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Computer, Graphic, and Traditional Systems: A Theoretical Study of Music Notation.Richard Wood Massi - 1993 - Dissertation, University of California, San Diego
    This study examines problems related to the representation of music. It constructs the sender/message/perceiver/result model, a prototype broad enough to incorporate a large variety of music and other notation systems, including those having to do with computers. The work defines music notation itself, describes various models for studying the subject--including the binary types prescriptive/descriptive, and symbolic/iconic--and assesses music notation as a contemporary practice. It encompasses a review of the actions and intentions of composers, performers, and audiences, and a consideration of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Embodied Cognition and the Grip of Computational Metaphors.Kate Finley - forthcoming - Ergo: An Open Access Journal of Philosophy.
    (Penultimate draft) Embodied Cognition holds that bodily (e.g. sensorimotor) states and processes are directly involved in some higher-level cognitive functions (e.g. reasoning). This challenges traditional views of cognition according to which bodily states and processes are, at most, indirectly involved in higher-level cognition. Although some elements of Embodied Cognition have been integrated into mainstream cognitive science, others still face adamant resistance. In this paper, rather than straightforwardly defend Embodied Cognition against specific objections I will do the following. First, I will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Individual homogenization in large-scale systems: on the politics of computer and social architectures.Jens Bürger & Andres Laguna-Tapia - 2020 - Palgrave Communications 6 (47).
    One determining characteristic of contemporary sociopolitical systems is their power over increasingly large and diverse populations. This raises questions about power relations between heterogeneous individuals and increasingly dominant and homogenizing system objectives. This article crosses epistemic boundaries by integrating computer engineering and a historicalphilosophical approach making the general organization of individuals within large-scale systems and corresponding individual homogenization intelligible. From a versatile archeological-genealogical perspective, an analysis of computer and social architectures is conducted that reinterprets Foucault’s disciplines and political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Focused categorization power of ontologies: General framework and study on simple existential concept expressions.Vojtěch Svátek, Ondřej Zamazal, Viet Bach Nguyen, Jiří Ivánek, Ján Kľuka & Miroslav Vacura - 2023 - Semantic Web 14 (6):1209-1253.
    When reusing existing ontologies for publishing a dataset in RDF (or developing a new ontology), preference may be given to those providing extensive subcategorization for important classes (denoted as focus classes). The subcategories may consist not only of named classes but also of compound class expressions. We define the notion of focused categorization power of a given ontology, with respect to a focus class and a concept expression language, as the (estimated) weighted count of the categories that can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Can a Computer Have a Religious Experience?Justin Charles Hite - manuscript
    A religious experience is a phenomenological occurrence which is interpreted by the perceiver in such a way as to affirm or strengthen the belief in a higher being or the beliefs of a particular religion. Religion and, therefore, religious experiences are primarily mental constructs. Computational theory of mind provides the strongest capabilities of applying mental activities to computers. However, cognitive science and philosophy needs to establish the link between beliefs and physical states in order for computational theory of mind to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Tools or toys? On specific challenges for modeling and the epistemology of models and computer simulations in the social sciences.Eckhart Arnold - manuscript
    Mathematical models are a well established tool in most natural sciences. Although models have been neglected by the philosophy of science for a long time, their epistemological status as a link between theory and reality is now fairly well understood. However, regarding the epistemological status of mathematical models in the social sciences, there still exists a considerable unclarity. In my paper I argue that this results from specific challenges that mathematical models and especially computer simulations face in the social sciences. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed a chatbot automation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Energy Efficiency Multi task Offloading and Resource Allocation in Mobile Edge Computing.LiHuanjie Zang - 2018 - International Journal of Computer Techniques 5 (1):5-14.
    On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Many-valued logics. A mathematical and computational introduction.Luis M. Augusto - 2020 - London: College Publications.
    2nd edition. Many-valued logics are those logics that have more than the two classical truth values, to wit, true and false; in fact, they can have from three to infinitely many truth values. This property, together with truth-functionality, provides a powerful formalism to reason in settings where classical logic—as well as other non-classical logics—is of no avail. Indeed, originally motivated by philosophical concerns, these logics soon proved relevant for a plethora of applications ranging from switching theory to cognitive modeling, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Human-Aided Artificial Intelligence: Or, How to Run Large Computations in Human Brains? Towards a Media Sociology of Machine Learning.Rainer Mühlhoff - 2019 - New Media and Society 1.
    Today, artificial intelligence, especially machine learning, is structurally dependent on human participation. Technologies such as Deep Learning (DL) leverage networked media infrastructures and human-machine interaction designs to harness users to provide training and verification data. The emergence of DL is therefore based on a fundamental socio-technological transformation of the relationship between humans and machines. Rather than simulating human intelligence, DL-based AIs capture human cognitive abilities, so they are hybrid human-machine apparatuses. From a perspective of media philosophy and social-theoretical critique, I (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private cloud SJF is utilized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Dark Side of the Force. When computer simulations lead us astray and model think narrows our imagination.Eckhart Arnold - 2001
    This paper is intended as a critical examination of the question of when and under what conditions the use of computer simulations is beneficial to scientific explanations. This objective is pursued in two steps: First, I try to establish clear criteria that simulations must meet in order to be explanatory. Basically, a simulation has explanatory power only if it includes all causally relevant factors of a given empirical configuration and if the simulation delivers stable results within the measurement inaccuracies (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. On the expressive power of Łukasiewicz square operator.Marcelo E. Coniglio, Francesc Esteva, Tommaso Flaminio & Lluis Godo - forthcoming - Journal of Logic and Computation.
    The aim of the paper is to analyze the expressive power of the square operator of Łukasiewicz logic: ∗x=x⊙x⁠, where ⊙ is the strong Łukasiewicz conjunction. In particular, we aim at understanding and characterizing those cases in which the square operator is enough to construct a finite MV-chain from a finite totally ordered set endowed with an involutive negation. The first of our main results shows that, indeed, the whole structure of MV-chain can be reconstructed from the involution and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Analyzing the Explanatory Power of Bionic Systems With the Minimal Cognitive Grid.Antonio Lieto - 2022 - Frontiers in Robotics and AI 9.
    In this article, I argue that the artificial components of hybrid bionic systems do not play a direct explanatory role, i.e., in simulative terms, in the overall context of the systems in which they are embedded in. More precisely, I claim that the internal procedures determining the output of such artificial devices, replacing biological tissues and connected to other biological tissues, cannot be used to directly explain the corresponding mechanisms of the biological component(s) they substitute (and therefore cannot be used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Effects of Cloud-based M-learning on Student Motivation and Creative Performance: A Case Study on Computer illustration Course.I.-Fan Tsai - unknown
    This study was conducted to explore the effects of cloud-based m- learning on students’ motivation and creative performance in computer illustration course. Variables of motivation, creative behavior, creative process and creative product were conducted to understand the situations, differences, and the predictive power cloud-based m-learning had in creative performance. A nonequivalent pretest–posttest design was adopted, and 123 university students from Taipei City, Taiwan,were recruited as research participants in the study during 10-weeks experiment. They were asked to complete a motivation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. UTILIZATION OF A DUAL-AXIS SOLAR TRACKER TO INCREASE THE EFFECTIVENESS OF SOLAR PANELS IN THE STORAGE OF POWER IN LITHIUM-ION BATTERIES.Geodizon Iman C. Bermudez, Joanna Patricia U. Develleres, Danniah Shamella N. Palao, Kate Aileen M. Gromia, Rainer Jade T. Daingan & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    This study was conducted to determine the effectiveness of utilizing the Dual-axis Solar Tracker in harnessing solar energy and storing it in lithium-ion batteries in terms of voltage and milliamps per hour gained. This study utilized two solar panel systems, the Static Solar Panel System and the Dual-Axis Solar Tracker and aimed to prove the significant difference generated by solar panel systems in terms of voltage and milliamps per hour. This study employed an Applied Experimental Research Design utilizing Arduino Uno, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Physics of God and the Quantum Gravity Theory of Everything.James Redford - 2021 - In The Physics of God and the Quantum Gravity Theory of Everything: And Other Selected Works. Chișinău, Moldova: Eliva Press. pp. 1-186.
    Analysis is given of the Omega Point cosmology, an extensively peer-reviewed proof (i.e., mathematical theorem) published in leading physics journals by professor of physics and mathematics Frank J. Tipler, which demonstrates that in order for the known laws of physics to be mutually consistent, the universe must diverge to infinite computational power as it collapses into a final cosmological singularity, termed the Omega Point. The theorem is an intrinsic component of the Feynman-DeWitt-Weinberg quantum gravity/Standard Model Theory of Everything (TOE) (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. The Emotional Mind: the affective roots of culture and cognition.Stephen Asma & Rami Gabriel - 2019 - Harvard University Press.
    Tracing the leading role of emotions in the evolution of the mind, a philosopher and a psychologist pair up to reveal how thought and culture owe less to our faculty for reason than to our capacity to feel. Many accounts of the human mind concentrate on the brain’s computational power. Yet, in evolutionary terms, rational cognition emerged only the day before yesterday. For nearly 200 million years before humans developed a capacity to reason, the emotional centers of the brain (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  33. Trial and error mathematics: Dialectical systems and completions of theories.Luca San Mauro, Jacopo Amidei, Uri Andrews, Duccio Pianigiani & Andrea Sorbi - 2019 - Journal of Logic and Computation 1 (29):157-184.
    This paper is part of a project that is based on the notion of a dialectical system, introduced by Magari as a way of capturing trial and error mathematics. In Amidei et al. (2016, Rev. Symb. Logic, 9, 1–26) and Amidei et al. (2016, Rev. Symb. Logic, 9, 299–324), we investigated the expressive and computational power of dialectical systems, and we compared them to a new class of systems, that of quasi-dialectical systems, that enrich Magari’s systems with a natural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. B-theory.Bakytzhan Oralbekov - manuscript
    Sir Roger Penrose and prof. Stuart Hameroff had substantiated a theory that a human brain performs quantum computations. Logically, a question comes what information does then the brain compute and what is the result of such a quantum computing? To answer this, it is tempting to exploit isomorphism between complex hermitian 2 × 2 matrices and R4, more specifically a real vector representation of qubit states. P Arrighi proposed that "qubit states may be viewed as spatio-temporal objects, or indeed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  68
    Synthetic Socio-Technical Systems: Poiêsis as Meaning Making.Piercosma Bisconti, Andrew McIntyre & Federica Russo - 2024 - Philosophy and Technology 37 (3):1-19.
    With the recent renewed interest in AI, the field has made substantial advancements, particularly in generative systems. Increased computational power and the availability of very large datasets has enabled systems such as ChatGPT to effectively replicate aspects of human social interactions, such as verbal communication, thus bringing about profound changes in society. In this paper, we explain that the arrival of generative AI systems marks a shift from ‘interacting through’ to ‘interacting with’ technologies and calls for a reconceptualization of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Evolution of Consciousness.Danko D. Georgiev - 2024 - Life 14 (1):48.
    The natural evolution of consciousness in different animal species mandates that conscious experiences are causally potent in order to confer any advantage in the struggle for survival. Any endeavor to construct a physical theory of consciousness based on emergence within the framework of classical physics, however, leads to causally impotent conscious experiences in direct contradiction to evolutionary theory since epiphenomenal consciousness cannot evolve through natural selection. Here, we review recent theoretical advances in describing sentience and free will as fundamental aspects (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  49
    Bayesian Perspectives on Mathematical Practice.James Franklin - 2024 - In Bharath Sriraman (ed.), Handbook of the History and Philosophy of Mathematical Practice. Cham: Springer. pp. 2711-2726.
    Mathematicians often speak of conjectures as being confirmed by evidence that falls short of proof. For their own conjectures, evidence justifies further work in looking for a proof. Those conjectures of mathematics that have long resisted proof, such as the Riemann hypothesis, have had to be considered in terms of the evidence for and against them. In recent decades, massive increases in computer power have permitted the gathering of huge amounts of numerical evidence, both for conjectures in pure mathematics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Dissolving the Grounding Problem: How the Pen is Mightier than the Sword.Nancy Salay - 2017 - In R. Catrambone & S. Ohlsson (eds.), Proceedings of the 38th Annual Conference of the Cognitive Science Society.
    The computational metaphor for mind is still the central guiding idea in cognitive science despite many insightful and well-founded rejections of it. There is good reason for its staying power: when we are at our cognitive best, we reason about our world with our concepts. But the challengers are right, I argue, in insisting that no reductive account of that capacity is forthcoming. Here I describe an externalist account that grounds representations in organism-level engagement with its environment, not in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Revamping molecular biology for the twentieth first century, or putting back the theoretical horse ahead of the technological cart.Armando Aranda-Anzaldo - 2010 - Ludus Vitalis 18 (33):267-270.
    Molecular biology is a relatively new and very successful branch of science but currently it faces challenges posed by very complex issues that cannot be addressed by a traditional reductionist approach. However, despite its origins in the providential shift of some theoretical physicists to biology, currently molecular biology is immersed in a blind trend in which high-throughput technology, able to generate trillions of data, is becoming the leading edge of a discipline that has traded rational and critical thinking for computer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. The New Testament Writers (Introduction to Book).Lascelles G. B. James - forthcoming - Self Published.
    The style, tone and tenor of the New Testament writers are unique and exceptional. Jesus of Nazareth, Hebraic roots, Old Testament literature, oral tradition, Hellenistic influence, Roman governance, 1st century socio-politics, and multifarious linguistic elements combined to immortalize their literary records and make them indelible in the minds of contemplative readers. This book acknowledges previous work and seeks to connect the thoughts gleaned from them to seminal ideas that have their locus in the inquiry of how language can influence thought (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Supermachines and superminds.Eric Steinhart - 2003 - Minds and Machines 13 (1):155-186.
    If the computational theory of mind is right, then minds are realized by machines. There is an ordered complexity hierarchy of machines. Some finite machines realize finitely complex minds; some Turing machines realize potentially infinitely complex minds. There are many logically possible machines whose powers exceed the Church–Turing limit (e.g. accelerating Turing machines). Some of these supermachines realize superminds. Superminds perform cognitive supertasks. Their thoughts are formed in infinitary languages. They perceive and manipulate the infinite detail of fractal objects. They (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  83
    SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and inefficient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Infinitely Complex Machines.Eric Steinhart - 2007 - In Intelligent Computing Everywhere. Springer. pp. 25-43.
    Infinite machines (IMs) can do supertasks. A supertask is an infinite series of operations done in some finite time. Whether or not our universe contains any IMs, they are worthy of study as upper bounds on finite machines. We introduce IMs and describe some of their physical and psychological aspects. An accelerating Turing machine (an ATM) is a Turing machine that performs every next operation twice as fast. It can carry out infinitely many operations in finite time. Many ATMs can (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. From the Closed Classical Algorithmic Universe to an Open World of Algorithmic Constellations.Mark Burgin & Gordana Dodig-Crnkovic - 2013 - In Gordana Dodig-Crnkovic Raffaela Giovagnoli (ed.), Computing Nature. pp. 241--253.
    In this paper we analyze methodological and philosophical implications of algorithmic aspects of unconventional computation. At first, we describe how the classical algorithmic universe developed and analyze why it became closed in the conventional approach to computation. Then we explain how new models of algorithms turned the classical closed algorithmic universe into the open world of algorithmic constellations, allowing higher flexibility and expressive power, supporting constructivism and creativity in mathematical modeling. As Goedels undecidability theorems demonstrate, the closed algorithmic universe (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Ontological theory for ontological engineering: Biomedical systems information integration.James M. Fielding, Jonathan Simon, Werner Ceusters & Barry Smith - 2004 - In Fielding James M., Simon Jonathan, Ceusters Werner & Smith Barry (eds.), Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning (KR2004), Whistler, BC, 2-5 June 2004. pp. 114–120.
    Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for such (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. On the Notions of Rulegenerating & Anticipatory Systems.Niels Ole Finnemann - 1997 - Online Publication on Conference Site - Which Does Not Exist Any More.
    Until the late 19th century scientists almost always assumed that the world could be described as a rule-based and hence deterministic system or as a set of such systems. The assumption is maintained in many 20th century theories although it has also been doubted because of the breakthrough of statistical theories in thermodynamics (Boltzmann and Gibbs) and other fields, unsolved questions in quantum mechanics as well as several theories forwarded within the social sciences. Until recently it has furthermore been assumed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The mindsponge and BMF analytics for innovative thinking in social sciences and humanities.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.) - 2022 - Berlin, Germany: De Gruyter.
    Academia is a competitive environment. Early Career Researchers (ECRs) are limited in experience and resources and especially need achievements to secure and expand their careers. To help with these issues, this book offers a new approach for conducting research using the combination of mindsponge innovative thinking and Bayesian analytics. This is not just another analytics book. 1. A new perspective on psychological processes: Mindsponge is a novel approach for examining the human mind’s information processing mechanism. This conceptual framework is used (...)
    Download  
     
    Export citation  
     
    Bookmark   93 citations  
  50. Okay, Google, Can I Trust You? An Anti-trust Argument for Antitrust.Trystan S. Goetze - 2023 - In Mark Alfano & David Collins (eds.), The Moral Psychology of Trust. Lexington Books. pp. 237-257.
    In this chapter, I argue that it is impossible to trust the Big Tech companies, in an ethically important sense of trust. The argument is not that these companies are untrustworthy. Rather, I argue that the power to hold the trustee accountable is a necessary component of this sense of trust, and, because these companies are so powerful, they are immune to our attempts, as individuals or nation-states, to hold them to account. It is, therefore, literally impossible to trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 967