Results for 'software verification'

478 found
Order:
  1. A Dynamic Software Certification and Verification Procedure.Julio Michael Stern & Carlos Alberto de Braganca Pereira - 1998 - SCI’99 Proceedings 2:426-435.
    in Oct-14-1998 ordinance INDESP-IO4 established the federal software certification and verification requirements for gaming machines in Brazil. The authors present the rationale behind these criteria, whose basic principles can find applications in several other software authentication applications.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. What Have Google’s Random Quantum Circuit Simulation Experiments Demonstrated about Quantum Supremacy?Jack K. Horner & John Symons - 2021 - In Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti & Quoc-Nam Tran (eds.), Advances in Software Engineering, Education, and E-Learning: Proceedings From Fecs'20, Fcs'20, Serp'20, and Eee'20. Springer.
    Quantum computing is of high interest because it promises to perform at least some kinds of computations much faster than classical computers. Arute et al. 2019 (informally, “the Google Quantum Team”) report the results of experiments that purport to demonstrate “quantum supremacy” – the claim that the performance of some quantum computers is better than that of classical computers on some problems. Do these results close the debate over quantum supremacy? We argue that they do not. In the following, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Introduction: Formal approaches to multi-agent systems: Special issue of best papers of FAMAS 2007.B. Dunin-Keplicz & R. Verbrugge - 2013 - Logic Journal of the IGPL 21 (3):309-310.
    Over the last decade, multi-agent systems have come to form one of the key tech- nologies for software development. The Formal Approaches to Multi-Agent Systems (FAMAS) workshop series brings together researchers from the fields of logic, theoreti- cal computer science and multi-agent systems in order to discuss formal techniques for specifying and verifying multi-agent systems. FAMAS addresses the issues of logics for multi-agent systems, formal methods for verification, for example model check- ing, and formal approaches to cooperation, multi-agent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  7. Verification: The Hysteron Proteron Argument.Francis Jeffry Pelletier & Bernard Linsky - 2018 - Journal for the History of Analytical Philosophy 6 (6).
    This paper investigates the strange case of an argument that was directed against a positivist verification principle. We find an early occurrence of the argument in a talk by the phenomenologist Roman Ingarden at the 1934 International Congress of Philosophy in Prague, where Carnap and Neurath were present and contributed short rejoinders. We discuss the underlying presuppositons of the argument, and we evaluate whether the attempts by Carnap (especially) actually succeed in answering this argument. We think they don’t, and (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8. Constructive Verification, Empirical Induction, and Falibilist Deduction: A Threefold Contrast.Julio Michael Stern - 2011 - Information 2 (4):635-650.
    This article explores some open questions related to the problem of verification of theories in the context of empirical sciences by contrasting three epistemological frameworks. Each of these epistemological frameworks is based on a corresponding central metaphor, namely: (a) Neo-empiricism and the gambling metaphor; (b) Popperian falsificationism and the scientific tribunal metaphor; (c) Cognitive constructivism and the object as eigen-solution metaphor. Each of one of these epistemological frameworks has also historically co-evolved with a certain statistical theory and method for (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  9. SOCIAL VERIFICATION – HUMAN DIMENSONS OF THEORETICAL SCIENCE AND HIGH-TECH (CASUS BIOETHICS). Part Three. DYNAMICS OF GROWTH OF NEW KNOWLEDGE IN POSTACADEMICAL SCIENCE.Valentin Cheshko & Yulia Kosova - 2012 - Practical Philosophy 1:59-69.
    The new phase of science evolution is characterized by totality of subject and object of cognition and technology (high-hume). As a result, forming of network structure in a disciplinary matrix modern are «human dimensional» natural sciences and two paradigmal «nuclei» (attraktors). As a result, the complication of structure of disciplinary matrix and forming a few paradigm nuclei in modern «human dimensional» natural sciences are observed. In the process of social verification integration of scientific theories into the existent system of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. SOCIAL VERIFICATION – HUMAN DIMENSONS OF THEORETICAL SCIENCE AND HIGH-TECH (CASUS BIOETHICS). Part One.Valentin Cheshko & Yulia Kosova - 2011 - Practical Philosophy 1:94-100.
    The new phase of science evolution is characterized by totality of subject and object of cognition and technology (high-hume). As a result, forming of network structure in a disciplinary matrix modern are «human dimensional» natural sciences and two paradigmal «nuclei» (attraktors). As a result, the complication of structure of disciplinary matrix and forming a few paradigm nuclei in modern «human dimensional» natural sciences are observed. In the process of social verification integration of scientific theories into the existent system of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. SOCIAL VERIFICATION – HUMAN DIMENSONS OF THEORETICAL SCIENCE AND HIGH-TECH (CASUS BIOETHICS). Part Two.Valentin Cheshko & Yulia Kosova - 2011 - Practical Philosophy 2:46-55.
    The new phase of science evolution is characterized by totality of subject and object of cognition and technology (high-hume). As a result, forming of network structure in a disciplinary matrix modern are «human dimensional» natural sciences and two paradigmal «nuclei» (attraktors). As a result, the complication of structure of disciplinary matrix and forming a few paradigm nuclei in modern «human dimensional» natural sciences are observed.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Handwritten Signature Verification using Deep Learning. [REVIEW]Eman Alajrami, Belal A. M. Ashqar, Bassem S. Abu-Nasser, Ahmed J. Khalil, Musleh M. Musleh, Alaa M. Barhoom & Samy S. Abu-Naser - manuscript
    Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions. There are two kinds of signature verification: static and dynamic. Static(off-line) verification is the process of verifying an electronic or document signature after it has been made, while dynamic(on-line) verification takes place as a person creates his/her signature on a digital tablet or a similar device. Offline signature verification is not (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  13. Computer verification for historians of philosophy.Landon D. C. Elkind - 2022 - Synthese 200 (3):1-28.
    Interactive theorem provers might seem particularly impractical in the history of philosophy. Journal articles in this discipline are generally not formalized. Interactive theorem provers involve a learning curve for which the payoffs might seem minimal. In this article I argue that interactive theorem provers have already demonstrated their potential as a useful tool for historians of philosophy; I do this by highlighting examples of work where this has already been done. Further, I argue that interactive theorem provers can continue to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  15. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  18. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  99
    Introduction to Develop Some Software Programs for Dealing with Neutrosophic Sets.A. Salama, Haitham A. El-Ghareeb, Ayman M. Manie & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 3:51-52.
    In this paper, we have developed an Excel package to be utilized for calculating neutrosophic data and analyze them. The use of object oriented programming techniques and concepts as they may apply to the design and development a new framework to implement neutrosophic data operations, the c# programming language, NET Framework and Microsoft Visual Studio are used to implement the neutrosophic classes. We have used Excel as it is a powerful tool that is widely accepted and used for statistical analysis. (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  21. Plagiarism Software is a Creator or Destroyer for Effective Writing.A. Subaveerapandiyan - 2022 - DESIDOC Journal of Library and Information Technology 42 (2): 114-118.
    Plagiarism is malpractice, the fabrication of others’ “ideas or work” published without the proper permission or citation of the original contributors. Plagiarism is detected through different software, i.e., Turnitin, before publishing any research data. The present survey study assesses whether academicians, researchers, and scholars around the world perceive this software as a creator or destroyer of new thoughts and ideas. A survey of this research data was conducted with academicians, researchers, and scholars around the globe. The number of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The mind as the software of the brain.Ned Block - 1995 - In Daniel N. Osherson, Lila Gleitman, Stephen M. Kosslyn, S. Smith & Saadya Sternberg (eds.), An Invitation to Cognitive Science, Second Edition, Volume 3. Cambridge MA: MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Download  
     
    Export citation  
     
    Bookmark   59 citations  
  23. Improve Popper and procure a perfect simulacrum of verification indistinguishable from the real thing.Nicholas Maxwell - 2021 - Journal for General Philosophy of Science.
    According to Karl Popper, science cannot verify its theories empirically, but it can falsify them, and that suffices to account for scientific progress. For Popper, a law or theory remains a pure conjecture, probability equal to zero, however massively corroborated empirically it may be. But it does just seem to be the case that science does verify empirically laws and theories. We trust our lives to such verifications when we fly in aeroplanes, cross bridges and take modern medicines. We can (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Using Argument Diagramming Software in the Classroom.Maralee Harrell - 2005 - Teaching Philosophy 28 (2):163-177.
    Many undergraduates, philosophy majors included, read philosophical texts similar to the way they read stories. One method for teaching students how to discern the argumentative structure of a philosophy text is through argument diagrams (text boxes used to represent claims with arrows and lines used to represent connections between these claims). This paper provides criteria for an ideal argument diagramming software and then reviews the strengths and weaknesses of such software currently available, e.g. Araucaria, Argutect, Athena Standard, Inspiration, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  25. "La vérification en science et en théologie : qui valide quoi ?".Gagnon Philippe - 2022 - Connaître : Cahiers de l'Association Foi Et Culture Scientifique 57 (March):59-74.
    Très souvent, on compte sur la science pour nous sauver. Le rapport qu'on établit avec elle peut donner à penser que la science parlerait ainsi de choses, validerait quelque chose comme des évidences immédiates. La connaissance scientifique est inférentielle. Si elle a un objet, ce qu'en rigueur de termes la philosophie n'a pas, elle doit néanmoins se mettre à distance de lui pour se faire science. Elle valide ainsi des schèmes abstraits, qui ne sont scientifiques que dans cette mesure. Nous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Working platform design - Verification by static and dynamic plate load testing, case study Tirana, Albania.Klodjan Xhexhi - 2023 - Research Inventy: International Journal of Engineering and Science 13 (2):04-11.
    The foundation of a building connects the main body superstructure to the ground. Every form of foundation and footing have a unique application in a given location for a certain weather condition. Understanding the foundation work is crucial for carrying out building activities. Due to the variety of structures they support, foundations are frequently built in different subsoil conditions and are exposed to static loads. The proper evaluation of soil-bearing capacity is fundamental to the construction of various buildings. One of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Validation and Verification in Social Simulation: Patterns and Clarification of Terminology.Nuno David - 2009 - Epistemological Aspects of Computer Simulation in the Social Sciences, EPOS 2006, Revised Selected and Invited Papers, Lecture Notes in Artificial Intelligence, Squazzoni, Flaminio (Ed.) 5466:117-129.
    The terms ‘verification’ and ‘validation’ are widely used in science, both in the natural and the social sciences. They are extensively used in simulation, often associated with the need to evaluate models in different stages of the simulation development process. Frequently, terminological ambiguities arise when researchers conflate, along the simulation development process, the technical meanings of both terms with other meanings found in the philosophy of science and the social sciences. This article considers the problem of verification and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  30. Falsification of theories without verification of basic statements – an argument for the possibility of knowledge growth.Rainer Willi Maurer - manuscript
    Karl Popper rightly contests the possibility of a verification of basic statements. At the same time he strictly believes in the possibility of growth of empirical knowledge. Knowledge growth, however, is only possible if empirical theories can be falsified. This raises the question, how theories can be falsified, if a verification of those statements that falsify theories – i.e. basic statements – is not possible. This problem is often referred to as the “basic problem” or “problem of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. A Preliminary Experimental Verification of Violation of Bell Inequality in a Quantum Model of Jung Theory of Personality Formulated with Clifford Algebra.Elio Conte - 2010 - Journal of Consciousness Exploration and Research 1 (7):831-849.
    We comment some recent results obtained by using a Clifford bare bone skeleton of quantum mechanics in order to formulate the conclusion that quantum mechanics has its origin in the logic, and relates conceptual entities. Such results touch directly the basic problem about the structure of our cognitive and conceptual dynamics and thus of our mind. The problem of exploring consciousness results consequently to be strongly linked. This is the reason because studies on quantum mechanics applied to this matter are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Relevance and Verification.Ben Blumson - 2021 - Philosophical Quarterly 71 (3):457-480.
    A. J. Ayer’s empiricist criterion of meaning was supposed to have sorted all statements into nonsense on the one hand, and tautologies or genuinely factual statements on the other. Unfortunately for Ayer, it follows from classical logic that his criterion is trivial—it classifies all statements as either tautologies or genuinely factual, but none as nonsense. However, in this paper, I argue that Ayer’s criterion of meaning can be defended from classical proofs of its triviality by the adoption of a relevant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Ciencia de la computación y filosofía: unidades de análisis del software.Juan Manuel Durán - 2018 - Principia 22 (2):203-227.
    Una imagen muy generalizada a la hora de entender el software de computador es la que lo representa como una “caja negra”: no importa realmente saber qué partes lo componen internamente, sino qué resultados se obtienen de él según ciertos valores de entrada. Al hacer esto, muchos problemas filosóficos son ocultados, negados o simplemente mal entendidos. Este artículo discute tres unidades de análisis del software de computador, esto es, las especificaciones, los algoritmos y los procesos computacionales. El objetivo (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Good and evil as softwares of the brain, on psychological immediates underlying the metaphysical ultimates-a contribution from cognitive social-psychology and semantic differential research.Guido Peeters - 1986 - Ultimate Reality and Meaning 9 (3):210-231.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed using manual (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. A Corpus Study of "Know": On the Verification of Philosophers' Frequency Claims about Language.Nat Hansen, J. D. Porter & Kathryn Francis - 2021 - Episteme 18 (2):242-268.
    We investigate claims about the frequency of "know" made by philosophers. Our investigation has several overlapping aims. First, we aim to show what is required to confirm or disconfirm philosophers’ claims about the comparative frequency of different uses of philosophically interesting expressions. Second, we aim to show how using linguistic corpora as tools for investigating meaning is a productive methodology, in the sense that it yields discoveries about the use of language that philosophers would have overlooked if they remained in (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  42. The effect of negative polarity items on inference verification.Anna Szabolcsi, Lewis Bott & Brian McElree - 2008 - Journal of Semantics 25 (4):411-450.
    The scalar approach to negative polarity item (NPI) licensing assumes that NPIs are allowable in contexts in which the introduction of the NPI leads to proposition strengthening (e.g., Kadmon & Landman 1993, Krifka 1995, Lahiri 1997, Chierchia 2006). A straightforward processing prediction from such a theory is that NPI’s facilitate inference verification from sets to subsets. Three experiments are reported that test this proposal. In each experiment, participants evaluated whether inferences from sets to subsets were valid. Crucially, we manipulated (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Observations cosmologiques pour la vérification de la relativité générale.Sfetcu Nicolae - manuscript
    Les scientifiques espèrent qu'à l'avenir ils pourront tester des trous noirs en observant les effets causés par un fort champ gravitationnel à proximité, comme la lentille gravitationnelle. Il existe déjà des observations sur les lentilles gravitationnelles faibles, dans lesquelles les rayons lumineux sont déviés en quelques secondes seulement, mais jamais directement pour un trou noir. Il existe plusieurs candidats à cet effet, en orbite autour du Sagittaire A*. Plusieurs conjectures ad hoc ont été introduites pour mieux expliquer les observations de (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector).Bogusław Plawgo, Anna Grabska, Magdalena Klimczuk-Kochańska, Andrzej Klimczuk, Jacek Kierklo & Justyna Żynel-Etel - 2011 - Wojewódzki Urząd Pracy W Białymstoku.
    More Info: B. Plawgo, A. Grabska, M. Klimczuk-Kochańska, A. Klimczuk, J. Kierklo, J. Żynel-Etel, Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector), Wojewódzki Urząd Pracy w Białymstoku, Białystok 2011.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. The Hemingway's Six-Word Story Effect: A Psycholinguistic Verification.Vitalii Shymko - 2022 - Psycholinguistics 32 (1).
    Purpose. An empirical verification of the Hemingway’s “sad hypothesis” and study of some individual characteristics of a discourse formation in a process of short texts understanding. -/- Methods and procedure of research. The study was based on the principle of a standardized interview, which was carried out on a random sample (103 respondents) using the questionnaire. The subjects interpreted two proverbs and the short story by Hemingway (“For sale: baby shoes, never worn”). In each case, it was proposed to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Digital Democracy: Episode IV—A New Hope*: How a Corporation for Public Software Could Transform Digital Engagement for Government and Civil Society.John Gastil & Todd Davies - 2020 - Digital Government: Research and Practice (DGOV) 1 (1):Article No. 6 (15 pages).
    Although successive generations of digital technology have become increasingly powerful in the past 20 years, digital democracy has yet to realize its potential for deliberative transformation. The undemocratic exploitation of massive social media systems continued this trend, but it only worsened an existing problem of modern democracies, which were already struggling to develop deliberative infrastructure independent of digital technologies. There have been many creative conceptions of civic tech, but implementation has lagged behind innovation. This article argues for implementing one such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process forming (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A Study of Obstacles in Plagiarism Software Subscribing by Colleges in Tamil Nadu.A. Subaveerapandiyan & N. Sakthivel - 2022 - DESIDOC Journal of Library and Information Technology 42 (5):318-324.
    This article attempts to comprehend the current issues and hurdles that Indian colleges affiliated with Tamil Nadu State Universities encounter when trying to subscribe to a software that detects plagiarism. The study’s goals are to determine whether colleges employ anti-plagiarism software, whether they ensure that their student-given assignments are free of copyright infringement, whether tutors teach about academic misconduct, and what people seem to think of anti-plagiarism software. We surveyed for this study and distributed the questionnaires among (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 478