Results for 'Computational techniques'

1000+ found
Order:
  1.  7
    ALPUK91: Proceedings of the 3rd UK Annual Conference on Logic Programming, Edinburgh, 10–12 April 1991.Tim Duncan, C. S. Mellish, Geraint A. Wiggins & British Computer Society - 1992 - Springer.
    Since its conception nearly 20 years ago, Logic Programming - the idea of using logic as a programming language - has been developed to the point where it now plays an important role in areas such as database theory, artificial intelligence and software engineering. However, there are still many challenging research issues to be addressed and the UK branch of the Association for Logic Programming was set up to provide a forum where the flourishing research community could discuss important issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  6
    Computational techniques for a simple theory of conditional preferences.Nic Wilson - 2011 - Artificial Intelligence 175 (7-8):1053-1091.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Natural Computation Techniques Applications-Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.Ming Li & Huamin Feng - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4222--448.
    No categories
     
    Export citation  
     
    Bookmark  
  4. Natural Computation Techniques Applications-Using of Intelligent Particle Swarm Optimization Algorithm to Synthesis the Index Modulation Profile of Narrow Ban Fiber Bragg Grating Filter.Yumin Liu & Zhongyuan Yu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4222--438.
    No categories
     
    Export citation  
     
    Bookmark  
  5.  6
    Stochastic methods and computer techniques in quantum dynamics.Heinrich Mitter & Ludwig Pittner (eds.) - 1984 - New York: Springer Verlag.
  6.  24
    Sensor and Actuator Fault Diagnosis Based on Soft Computing Techniques.Abdelhalim Boutarfa, Noureddine Slimane, Kheireddine Chafaa & Mohamed Salah Khireddine - 2015 - Journal of Intelligent Systems 24 (1):1-21.
    Computational intelligence techniques are being investigated as an extension of the traditional fault diagnosis methods. This article presents, for the first time, a scheme for fault detection and isolation via artificial neural networks and fuzzy logic. It deals with the sensor fault of a three-link selective compliance assembly robot arm robot. A second scheme is proposed for fault detection and accommodation via analytical redundancy, and it deals with the sensor fault of a three-link SCARA robot. These proposed FDI (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  14
    Assessing the impact of heat vulnerability on urban public spaces using a fuzzy-based unified computational technique.Rajeev Kumar & Saswat Kishore Mishra - forthcoming - AI and Society:1-18.
    Over the years, the urban heat vulnerability has evolved as a pressing global concern for researchers and policymakers alike. Numerous studies have aimed at mitigating the adverse effects of urban heat vulnerability on public health and safety. However, the critical task of selecting the most fitting indicator for urban heat islands in public spaces is not emphasized in the existing studies, considering the diverse indices available. Beyond identification, studies that delve into the prioritization of these indices and the determination of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  9
    Simulation of dislocation movements by a computer technique.M. J. Turunen - 1974 - Philosophical Magazine 30 (5):1033-1041.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  9
    Analysis of Beam-Column Designs by Varying Axial Load with Internal Forces and Bending Rigidity Using a New Soft Computing Technique.Wen Huang, Tianhua Jiang, Xiucheng Zhang, Naveed Ahmad Khan & Muhammad Sulaiman - 2021 - Complexity 2021:1-19.
    Design problems in structural engineering are often modeled as differential equations. These problems are posed as initial or boundary value problems with several possible variations in structural designs. In this paper, we have derived a mathematical model that represents different structures of beam-columns by varying axial load with or without internal forces including bending rigidity. We have also developed a novel solver, the LeNN-NM algorithm, which consists of weighted Legendre polynomials, and a single path following optimizer, the Nelder–Mead algorithm. To (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Real-World Applications of Evolutionary Computation Techniques-Clustering Protein Interaction Data Through Chaotic Genetic Algorithm.Hongbiao Liu & Juan Liu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4247--858.
    No categories
     
    Export citation  
     
    Bookmark  
  11. Facing Computing as Technique: Towards a History and Philosophy of Computing.Liesbeth de Mol & Giuseppe Primiero - 2014 - Philosophy and Technology 27 (3):321-326.
    We present the methodological principles underlying the scientific activities of the DHST Commission on the History and Philosophy of Computing. This volume collects refereed selected papers from the First International Conference organized by the Commission.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  40
    A computational study of cross-situational techniques for learning word-to-meaning mappings.Jeffrey Mark Siskind - 1996 - Cognition 61 (1-2):39-91.
  13.  5
    Computer Literacy, Technique, and Gender.Roy Wilson - 1998 - Bulletin of Science, Technology and Society 18 (2):109-114.
    This article concerns the curriculum of computer literacy (CL). A strong sense of technical necessity informs the design of the CL curriculum, and as a result, instruction is inadequate at best and dehumanizing at worst. CL curriculum and instruction are informed by a sense of technical determinism and a particular form of masculinity. This article draws mainly from the sociology of education, supplemented by personal observation. The article has two implications. First, to reduce the failure and frustration that many feel (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. A computational study of crosssituational techniques for learning word-to-meaning mapping.Je rey Siskind - 1996 - Cognition 61 (1-2):39-91.
     
    Export citation  
     
    Bookmark  
  15.  13
    Soft computing based compressive sensing techniques in signal processing: A comprehensive review.Sanjay Jain & Ishani Mishra - 2020 - Journal of Intelligent Systems 30 (1):312-326.
    In this modern world, a massive amount of data is processed and broadcasted daily. This includes the use of high energy, massive use of memory space, and increased power use. In a few applications, for example, image processing, signal processing, and possession of data signals, etc., the signals included can be viewed as light in a few spaces. The compressive sensing theory could be an appropriate contender to manage these limitations. “Compressive Sensing theory” preserves extremely helpful while signals are sparse (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Techniques to introduce historical computers into the computer science curriculum.Douglas Harms - 2007 - Communication and Cognition: An Interdisciplinary Quarterly Journal 40 (1):57-66.
     
    Export citation  
     
    Bookmark  
  17. Display Techniques for an Experimental Computer-Based Library.Donald R. Haring - 1968 - In Peter Koestenbaum (ed.), Proceedings. [San Jose? Calif.,: [San Jose? Calif.. pp. 7.
     
    Export citation  
     
    Bookmark  
  18. Computer vision for artists and designers: pedagogic tools and techniques for novice programmers. [REVIEW]Golan Levin - 2006 - AI and Society 20 (4):462-482.
    This article attempts to demystify computer vision for novice programmers through a survey of new applications in the arts, system design considerations, and contemporary tools. It introduces the concept and gives a brief history of computer vision within interactive art from Myron Kruger to the present. Basic techniques of computer vision such as detecting motion and object tracking are discussed in addition to various software applications created for exploring the topic. As an example, the results of a one-week machine (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  2
    On Making Historical Techniques More Specific: "Real Types" Constructed with a Computer.George Murphy & M. Mueller - 1967 - History and Theory 6 (1):14-32.
    Programming computers to construct "real types," generally descriptive of a class of societies, makes explicit all steps in the thought process of such constructions because unambiguous instructions to, the computer are needed. The historian uses his judgment to choose a data field and variables that may be relevant in forming a type. He then looks for matches; he divides the data field into groups according to one variable and sees if the other variables differ significantly according to these groups. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. Compensating the Computational Bias of Spreadsheets with MKM Techniques.Michael Kohlhase - unknown
    Spreadsheets are mathematical documents that are heavily employed in administration, financial forecasting, education, and science because of their intuitive, flexible, and direct approach to computation. In this paper we show that spreadsheets are interesting applications for MKM techniques which can alleviate usability and maintenance problems as spreadsheet-based applications grow evermore complex and longlived. We present the software and information architecture of a semantic enhancement of MS Excel spreadsheets that aims at compensating the computational bias in spreadsheets.
     
    Export citation  
     
    Bookmark   2 citations  
  21.  21
    Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery.Jose M. Gonzalez-Cava, Rafael Arnay, Juan Albino Mendez-Perez, Ana León, María Martín, Jose A. Reboso, Esteban Jove-Perez & Jose Luis Calvo-Rolle - 2021 - Logic Journal of the IGPL 29 (2):236-250.
    This work focuses on the application of machine learning techniques to assist the clinicians in the administration of analgesic drug during general anaesthesia. Specifically, the main objective is to propose the basis of an intelligent system capable of making decisions to guide the opioid dose changes based on a new nociception monitor, the analgesia nociception index. Clinical data were obtained from 15 patients undergoing cholecystectomy surgery. By means of an off-line study, machine learning techniques were applied to analyse (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  14
    Implementation of the Spark technique in a matrix distributed computing algorithm.Korhan Cengiz & Ying Wang - 2022 - Journal of Intelligent Systems 31 (1):660-671.
    Two analyzes of Spark engine performance strategies to implement the Spark technique in a matrix distributed computational algorithm, the multiplication of a sparse multiplication operational test model. The dimensions of the two input sparse matrices have been fixed to 30,000 × 30,000, and the density of the input matrix have been changed. The experimental results show that when the density reaches about 0.3, the original dense matrix multiplication performance can outperform the sparse-sparse matrix multiplication, which is basically consistent with (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  57
    The elementary computable functions over the real numbers: applying two new techniques[REVIEW]Manuel L. Campagnolo & Kerry Ojakian - 2008 - Archive for Mathematical Logic 46 (7-8):593-627.
    The basic motivation behind this work is to tie together various computational complexity classes, whether over different domains such as the naturals or the reals, or whether defined in different manners, via function algebras (Real Recursive Functions) or via Turing Machines (Computable Analysis). We provide general tools for investigating these issues, using two techniques we call approximation and lifting. We use these methods to obtain two main theorems. First, we provide an alternative proof of the result from Campagnolo (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  28
    A Clustering Technique Using Dynamic Filtering Concepts and its Application to Computer Workload Modeling.K. I. Shihab & H. A. Ramadhan - 2000 - Journal of Intelligent Systems 10 (4):321-344.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  2
    The Autonomy of Technique as a Social and Historical Description: Our Failure to Exercise Our Responsibilities by Digitizing Life and Surrendering It to Computers.Willem H. Vanderburg - 2012 - Bulletin of Science, Technology and Society 32 (4):331-337.
    This article explores the social and historical conditions under which “people changing technology” overshadows that of “technology changing people” through its influence on human life, society, and the biosphere. Social construction and determinism are thus two sides of the same coin. However, both ignore the inseparability of thoughts and action from lives, lives from communities, and communities from their historical journeys. This hides from view the possibility of technology becoming a secular myth, in the sense of cultural anthropology. The current (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  5
    Machine learning techniques to make computers easier to use.Hiroshi Motoda & Kenichi Yoshida - 1998 - Artificial Intelligence 103 (1-2):295-321.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  45
    Computability Theory.S. Barry Cooper - 2003 - Chapman & Hall.
    Computability theory originated with the seminal work of Gödel, Church, Turing, Kleene and Post in the 1930s. This theory includes a wide spectrum of topics, such as the theory of reducibilities and their degree structures, computably enumerable sets and their automorphisms, and subrecursive hierarchy classifications. Recent work in computability theory has focused on Turing definability and promises to have far-reaching mathematical, scientific, and philosophical consequences. Written by a leading researcher, Computability Theory provides a concise, comprehensive, and authoritative introduction to contemporary (...)
  28.  6
    Computational physics: an introduction.Franz Vesely - 2001 - New York: Kluwer Academic/Plenum Publishers.
    Vesely (experimental physics, U. of Vienna, Austria) provides the basic numerical and computational techniques, followed by an explanation of specific problems of computational physics. Appendices address properties of computing machines and an outline of the technique of Fast Fourier Transformation. The first edition, published by Plenum Press, Ne.
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  70
    Computer Ethics and Professional Responsibility.Terrell Ward Bynum & Simon Rogerson (eds.) - 1998 - Wiley-Blackwell.
    This clear and accessible textbook and its associated website offer a state of the art introduction to the burgeoning field of computer ethics and professional responsibility. Includes discussion of hot topics such as the history of computing; the social context of computing; methods of ethical analysis; professional responsibility and codes of ethics; computer security, risks and liabilities; computer crime, viruses and hacking; data protection and privacy; intellectual property and the “open source” movement; global ethics and the internet Introduces key issues (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  30.  32
    The computational complexity of hybrid temporal logics.C. Areces, P. Blackburn & M. Marx - 2000 - Logic Journal of the IGPL 8 (5):653-679.
    In their simplest form, hybrid languages are propositional modal languages which can refer to states. They were introduced by Arthur Prior, the inventor of tense logic, and played an important role in his work: because they make reference to specific times possible, they remove the most serious obstacle to developing modal approaches to temporal representation and reasoning. However very little is known about the computational complexity of hybrid temporal logics.In this paper we analyze the complexity of the satisfiability problem (...)
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  31.  82
    Computer Science and Metaphysics: A Cross-Fertilization.Edward N. Zalta, Christoph Benzmüller & Daniel Kirchner - 2019 - Open Philosophy 2 (1):230-251.
    Computational philosophy is the use of mechanized computational techniques to unearth philosophical insights that are either difficult or impossible to find using traditional philosophical methods. Computational metaphysics is computational philosophy with a focus on metaphysics. In this paper, we (a) develop results in modal metaphysics whose discovery was computer assisted, and (b) conclude that these results work not only to the obvious benefit of philosophy but also, less obviously, to the benefit of computer science, since (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  32.  90
    Extending Ourselves: Computational Science, Empiricism, and Scientific Method.Paul Humphreys - 2004 - New York, US: Oxford University Press.
    Computational methods such as computer simulations, Monte Carlo methods, and agent-based modeling have become the dominant techniques in many areas of science. Extending Ourselves contains the first systematic philosophical account of these new methods, and how they require a different approach to scientific method. Paul Humphreys draws a parallel between the ways in which such computational methods have enhanced our abilities to mathematically model the world, and the more familiar ways in which scientific instruments have expanded our (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   279 citations  
  33.  68
    Computer Simulation Validation: Fundamental Concepts, Methodological Frameworks, and Philosophical Perspectives.Claus Beisbart & Nicole J. Saam (eds.) - 2019 - Springer Verlag.
    This unique volume introduces and discusses the methods of validating computer simulations in scientific research. The core concepts, strategies, and techniques of validation are explained by an international team of pre-eminent authorities, drawing on expertise from various fields ranging from engineering and the physical sciences to the social sciences and history. The work also offers new and original philosophical perspectives on the validation of simulations. Topics and features: introduces the fundamental concepts and principles related to the validation of computer (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  34.  9
    Hierarchical clustering analysis of reading aloud data: a new technique for evaluating the performance of computational models.Serje Robidoux & Stephen C. Pritchard - 2014 - Frontiers in Psychology 5.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  36
    Archaeology Through Computational Linguistics: Inscription Statistics Predict Excavation Sites of Indus Valley Artifacts.Gabriel L. Recchia & Max M. Louwerse - 2016 - Cognitive Science 40 (8):2065-2080.
    Computational techniques comparing co-occurrences of city names in texts allow the relative longitudes and latitudes of cities to be estimated algorithmically. However, these techniques have not been applied to estimate the provenance of artifacts with unknown origins. Here, we estimate the geographic origin of artifacts from the Indus Valley Civilization, applying methods commonly used in cognitive science to the Indus script. We show that these methods can accurately predict the relative locations of archeological sites on the basis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Computational Methods to Extract Meaning From Text and Advance Theories of Human Cognition.Danielle S. McNamara - 2011 - Topics in Cognitive Science 3 (1):3-17.
    Over the past two decades, researchers have made great advances in the area of computational methods for extracting meaning from text. This research has to a large extent been spurred by the development of latent semantic analysis (LSA), a method for extracting and representing the meaning of words using statistical computations applied to large corpora of text. Since the advent of LSA, researchers have developed and tested alternative statistical methods designed to detect and analyze meaning in text corpora. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  18
    Computably Compact Metric Spaces.Rodney G. Downey & Alexander G. Melnikov - 2023 - Bulletin of Symbolic Logic 29 (2):170-263.
    We give a systematic technical exposition of the foundations of the theory of computably compact metric spaces. We discover several new characterizations of computable compactness and apply these characterizations to prove new results in computable analysis and effective topology. We also apply the technique of computable compactness to give new and less combinatorially involved proofs of known results from the literature. Some of these results do not have computable compactness or compact spaces in their statements, and thus these applications are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Computing and cognitive science.Zenon W. Pylyshyn - 1989 - In Michael I. Posner (ed.), Foundations of Cognitive Science. MIT Press.
    influence. One of the principal characteristics that distinguishes Cognitive Science from more traditional studies of cognition within Psychology, is the extent to which it has been influenced by both the ideas and the techniques of computing. It may come as a surprise to the outsider, then, to discover that there is no unanimity within the discipline on either (a) the nature (and in some cases the desireabilty) of the influence and (b) what computing is –- or at least on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  39. Induction techniques developed to illuminate relationships between signs of emotion and their context, physical and social. Cowie, R., Douglas-Cowie, E., Sneddon, I., McRorie, Hanratty, J., McMahon, E. McKeown & G. - 2010 - In Klaus R. Scherer, Tanja Bänziger & Etienne Roesch (eds.), A Blueprint for Affective Computing: A Sourcebook and Manual. Oxford University Press.
     
    Export citation  
     
    Bookmark  
  40.  3
    Computing.Leslie Burkholder - 2017 - In W. H. Newton‐Smith (ed.), A Companion to the Philosophy of Science. Oxford, UK: Blackwell. pp. 44–52.
    Computing as a science is the study of computers, both the hardware and their programs, and all that goes with them (Newell and Simon 1976). The philosophy of computer science is concerned with problems of a philosophical kind raised by the discipline's goals, fundamental ideas, techniques or methods, and findings. It parallels other parts of philosophy ‐ for example, the philosophy of economics or linguistics or biology ‐ in primarily considering problems raised by one discipline, rather than issues raised (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  28
    Logic and computation: interactive proof with Cambridge LCF.Lawrence C. Paulson - 1987 - New York: Cambridge University Press.
    Logic and Computation is concerned with techniques for formal theorem-proving, with particular reference to Cambridge LCF (Logic for Computable Functions). Cambridge LCF is a computer program for reasoning about computation. It combines methods of mathematical logic with domain theory, the basis of the denotational approach to specifying the meaning of statements in a programming language. This book consists of two parts. Part I outlines the mathematical preliminaries: elementary logic and domain theory. They are explained at an intuitive level, giving (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  24
    Astrology, Computers, and the Volksgeist.Denis Dutton - 1995 - Philosophy and Literature 19 (2):424-434.
    In lieu of an abstract, here is a brief excerpt of the content:Astrology, Computers, and the VolksgeistDenis DuttonCarroll Righter is not a name you will recognize, unless, perhaps, you’re old enough and you grew up reading the Los Angeles Times. Righter was the Times’s astrologer, and encountering his name recently brought back a couple of memories from the early 1950s. I remember finding it strange that a man (he was pictured alongside his column) was called Carroll, though he didn’t spell (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  31
    The Computational and Experimental Complexity of Gene Perturbations for Regulatory Network Search.David Danks, Clark Glymour & Peter Spirtes - 2003 - In W. H. Hsu, R. Joehanes & C. D. Page (eds.), Proceedings of IJCAI-2003 workshop on learning graphical models for computational genomics.
    Various algorithms have been proposed for learning (partial) genetic regulatory networks through systematic measurements of differential expression in wild type versus strains in which expression of specific genes has been suppressed or enhanced, as well as for determining the most informative next experiment in a sequence. While the behavior of these algorithms has been investigated for toy examples, the full computational complexity of the problem has not received sufficient attention. We show that finding the true regulatory network requires (in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  35
    A Computer-Aided Affective Content Analysis of Nanotechnology Newspaper Articles.Robert Davis - 2011 - NanoEthics 5 (3):319-334.
    This paper explores the application of an affective content analysis to a selection of nanotechnology news articles gathered from selected newspapers. Thematic content analyses dominate current efforts to mine large text collections of popular science media; the addition of an affective analysis element can yield useful information to supplement future content analysis efforts. Using Whissell’s Dictionary of Affect in Language , the analysis rates news articles gathered over a twenty-two year period for their pleasantness, activeness, and imagery, determining the mean (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  9
    Computability of polish spaces up to homeomorphism.Matthew Harrison-Trainor, Alexander Melnikov & Keng Meng Ng - 2020 - Journal of Symbolic Logic 85 (4):1664-1686.
    We study computable Polish spaces and Polish groups up to homeomorphism. We prove a natural effective analogy of Stone duality, and we also develop an effective definability technique which works up to homeomorphism. As an application, we show that there is a $\Delta ^0_2$ Polish space not homeomorphic to a computable one. We apply our techniques to build, for any computable ordinal $\alpha $, an effectively closed set not homeomorphic to any $0^{}$-computable Polish space; this answers a question of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  20
    Incremental computation for structured argumentation over dynamic DeLP knowledge bases.Gianvincenzo Alfano, Sergio Greco, Francesco Parisi, Gerardo I. Simari & Guillermo R. Simari - 2021 - Artificial Intelligence 300 (C):103553.
    Structured argumentation systems, and their implementation, represent an important research subject in the area of Knowledge Representation and Reasoning. Structured argumentation advances over abstract argumentation frameworks by providing the internal construction of the arguments that are usually defined by a set of (strict and defeasible) rules. By considering the structure of arguments, it becomes possible to analyze reasons for and against a conclusion, and the warrant status of such a claim in the context of a knowledge base represents the main (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  5
    Computer applications for handling legal evidence, police investigation, and case argumentation.Ephraim Nissan - 2012 - New York: Springer.
    This book provides an overview of computer techniques and tools — especially from artificial intelligence (AI) — for handling legal evidence, police intelligence, crime analysis or detection, and forensic testing, with a sustained discussion of methods for the modelling of reasoning and forming an opinion about the evidence, methods for the modelling of argumentation, and computational approaches to dealing with legal, or any, narratives. By the 2000s, the modelling of reasoning on legal evidence has emerged as a significant (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. The computational theory of mind.Steven Horst - 2005 - Stanford Encyclopedia of Philosophy.
    Over the past thirty years, it is been common to hear the mind likened to a digital computer. This essay is concerned with a particular philosophical view that holds that the mind literally is a digital computer (in a specific sense of “computer” to be developed), and that thought literally is a kind of computation. This view—which will be called the “Computational Theory of Mind” (CTM)—is thus to be distinguished from other and broader attempts to connect the mind with (...)
    Direct download  
     
    Export citation  
     
    Bookmark   14 citations  
  49.  95
    Computational Cognitive Neuroscience.Carlos Zednik - 2018 - In Mark Sprevak & Matteo Colombo (eds.), The Routledge Handbook of the Computational Mind. Routledge.
    This chapter provides an overview of the basic research strategies and analytic techniques deployed in computational cognitive neuroscience. On the one hand, “top-down” strategies are used to infer, from formal characterizations of behavior and cognition, the computational properties of underlying neural mechanisms. On the other hand, “bottom-up” research strategies are used to identify neural mechanisms and to reconstruct their computational capacities. Both of these strategies rely on experimental techniques familiar from other branches of neuroscience, including (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  37
    Computers as a Source of A Posteriori Knowledge in Mathematics.Mikkel Willum Johansen & Morten Misfeldt - 2016 - International Studies in the Philosophy of Science 30 (2):111-127.
    Electronic computers form an integral part of modern mathematical practice. Several high-profile results have been proven with techniques where computer calculations form an essential part of the proof. In the traditional philosophical literature, such proofs have been taken to constitute a posteriori knowledge. However, this traditional stance has recently been challenged by Mark McEvoy, who claims that computer calculations can constitute a priori mathematical proofs, even in cases where the calculations made by the computer are too numerous to be (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000