Results for 'Software Process Modelling'

993 found
Order:
  1.  10
    Meta-analysis of the research impact of Baddeley’s multicomponent working memory model and Cowan’s embedded-processes model of working memory: A bibliometric mapping approach.Jarosław Orzechowski & Aleksandra Gruszka - 2016 - Polish Psychological Bulletin 47 (1):1-11.
    In this study bibliometric mapping method was employed to visualise the current research trends and the impact of the two most influential models of working memory, namely: A. D. Baddeley and G. J. Hitch’s multicomponent working memory model and N. Cowan’s embedded-processes model of working memory. Using VOSviewer software two maps were generated based on the index-term words extracted from the research papers citing Baddeley and Cowan, respectively. The maps represent networks of co-occurrences of index terms and can be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Using process algebra to describe human and software behaviors.Yingxu Wang - 2003 - Brain and Mind 4 (2):199-213.
    Although there are various ways to express actions and behaviors in natural languages, it is found in cognitive informatics that human and system behaviors may be classified into three basic categories: to be , to have , and to do . All mathematical means and forms, in general, are an abstract description of these three categories of system behaviors and their common rules. Taking this view, mathematical logic may be perceived as the abstract means for describing to be, set theory (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  27
    Model-based abductive reasoning in automated software testing.N. Angius - 2013 - Logic Journal of the IGPL 21 (6):931-942.
    Automated Software Testing (AST) using Model Checking is in this article epistemologically analysed in order to argue in favour of a model-based reasoning paradigm in computer science. Preliminarily, it is shown how both deductive and inductive reasoning are insufficient to determine whether a given piece of software is correct with respect to specified behavioural properties. Models algorithmically checked in Model Checking to select executions to be observed in Software Testing are acknowledged as analogical models which establish isomorphic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4.  2
    Using Process Algebra to Describe Human and Software Behaviors.Yingxu Wang - 2003 - Brain and Mind 4 (2):199-213.
    Although there are various ways to express actions and behaviors in natural languages, it is found in cognitive informatics that human and system behaviors may be classified into three basic categories: to be, to have, and to do. All mathematical means and forms, in general, are an abstract description of these three categories of system behaviors and their common rules. Taking this view, mathematical logic may be perceived as the abstract means for describing ‘to be,’ set theory for describing 'to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  16
    A Software Architecture for Multi-Cellular System Simulations on Graphics Processing Units.Anne Jeannin-Girardon, Pascal Ballet & Vincent Rodin - 2013 - Acta Biotheoretica 61 (3):317-327.
    The first aim of simulation in virtual environment is to help biologists to have a better understanding of the simulated system. The cost of such simulation is significantly reduced compared to that of in vivo simulation. However, the inherent complexity of biological system makes it hard to simulate these systems on non-parallel architectures: models might be made of sub-models and take several scales into account; the number of simulated entities may be quite large. Today, graphics cards are used for general (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  14
    Compliance-aware engineering process plans: the case of space software engineering processes.Julieth Patricia Castellanos-Ardila, Barbara Gallina & Guido Governatori - 2021 - Artificial Intelligence and Law 29 (4):587-627.
    Safety-critical systems manufacturers have the duty of care, i.e., they should take correct steps while performing acts that could foreseeably harm others. Commonly, industry standards prescribe reasonable steps in their process requirements, which regulatory bodies trust. Manufacturers perform careful documentation of compliance with each requirement to show that they act under acceptable criteria. To facilitate this task, a safety-centered planning-time framework, called ACCEPT, has been proposed. Based on compliance-by-design, ACCEPT capabilities permit to design Compliance-aware Engineering Process Plans, which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  21
    Ant: a process aware annotation software for regulatory compliance.Raphaël Gyory, David Restrepo Amariles, Gregory Lewkowicz & Hugues Bersini - forthcoming - Artificial Intelligence and Law:1-36.
    Accurate data annotation is essential to successfully implementing machine learning (ML) for regulatory compliance. Annotations allow organizations to train supervised ML algorithms and to adapt and audit the software they buy. The lack of annotation tools focused on regulatory data is slowing the adoption of established ML methodologies and process models, such as CRISP-DM, in various legal domains, including in regulatory compliance. This article introduces Ant, an open-source annotation software for regulatory compliance. Ant is designed to adapt (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  16
    Hard Facts and Software: The Co-production of Indicators in a Land-use Planning Model.Laureen Elgert - 2013 - Environmental Values 22 (6):765-786.
    Using land-use models in deliberative planning is promoted as an example of how environmental decision-making can be subject to both: 1) facts about how the interaction between human action and natural processes; and, 2) local perspectives on how land-use planning processes can incorporate normative concerns. This 'normative' input is often shaped and limited by the presentation of the modelled facts. This paper, however, shows that the selection and measurement of indicators, the primary outcomes of modelling exercises, are subject to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  9. Complexity of meaning, 3 Complexity of processing operations, 3 Conceptual classes, 103 Connectionism, 61, 80, 86, 87.Competition Model - 2005 - Behaviorism 34:83.
    No categories
     
    Export citation  
     
    Bookmark  
  10.  24
    Free and open source software (FOSS) as a model domain for answering big questions about creativity.Scott Dexter & Aaron Kozbelt - 2013 - Mind and Society 12 (1):113-123.
    In free and open source software (FOSS), computer code is made freely accessible and can be modified by anyone. It is a creative domain with many unique features; the FOSS mode of creativity has also influenced many aspects of contemporary cultural production. In this article we identify a number of fundamental but unresolved general issues in the study of creativity, then examine the potential for the study of FOSS to inform these topics. Archival studies of the genesis of FOSS (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  15
    3D modelling and visualization for Vision-based Vibration Signal Processing and Measurement.Raj Karan Singh, Gurpreet Singh Panesar, Mohammed Wasim Bhatt, Tarun Kumar Lohani, Mohammad Shabaz & Qi Yao - 2021 - Journal of Intelligent Systems 30 (1):541-553.
    With the technological evolutionary advent, a vision-based approach presents the remote measuring approach for the analysis of vibration. The structure vibration test and model parameter identification in the detection of the structure of the bridge evaluation occupies the important position. The bridge structure to operate safely and reliably is ensured, according to the geological data of qixiashan lead-zinc mine and engineering actual situation, with the aid of international mining software Surpac. To build the 3D visualization model of the application (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. The genetic recombination of science and religion.Stephen M. Modell - 2010 - Zygon 45 (2):462-468.
    The estrangement between genetic scientists and theologians originating in the 1960s is reflected in novel combinations of human thought (subject) and genes (investigational object), paralleling each other through the universal process known in chaos theory as self-similarity. The clash and recombination of genes and knowledge captures what Philip Hefner refers to as irony, one of four voices he suggests transmit the knowledge and arguments of the religion-and-science debate. When viewed along a tangent connecting irony to leadership, journal dissemination, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  25
    Generating Use Case Models from Arabic User Requirements in a Semiautomated Approach Using a Natural Language Processing Tool.Sari Jabbarin & Nabil Arman - 2015 - Journal of Intelligent Systems 24 (2):277-286.
    Automated software engineering has attracted a large amount of research efforts. The use of object-oriented methods for software systems development has made it necessary to develop approaches that automate the construction of different Unified Modeling Language models in a semiautomated approach from textual user requirements. UML use case models represent an essential artifact that provides a perspective of the system under analysis or development. The development of such use case models is very crucial in an object-oriented development method. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  47
    Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  15.  36
    Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361 - 373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer’s use intention of pirated software. This study aims to understand the consumer’s use intention of pirated software in Taiwan based on the theory of planned behavior (TPB) proposed by Ajzen (Organizational Behavior and Human Decision Processes, 50, 179, 1991). In addition, moral intensity and moral judgment are adopted as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  17. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  10
    Synthesis Theory in Action: Deductive Derivation of Algorithms for Application Software.Valery Kolisnyk & Ostap Bodyk - 2023 - Epistemological studies in Philosophy, Social and Political Sciences 6 (2):11-26.
    The significance of the study is contingent upon two criteria. All objects in the actual world that can capture a researcher’s attention are inherently complicated. Furthermore, every commodity that an individual manufactures and every work of art that an individual develops are intricate in nature. The entirety of the processes that an individual perceives and instigates are intricate. Although many professions have established techniques for constructing intricate entities, there currently exists no universally applicable concepts or methodologies for comprehensively studying, designing, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  13
    A theory of change for prioritised resilient and evolvable software systems.Giuseppe Primiero, Franco Raimondi & Taolue Chen - 2019 - Synthese 198 (S23):5719-5744.
    The process of completing, correcting and prioritising specifications is an essential but very complex task for the maintenance and improvement of software systems. The preservation of functionalities and the ability to accommodate changes are main objectives of the software development cycle to guarantee system reliability. Logical theories able to fully model such processes are still insufficient. In this paper we propose a full formalisation of such operations on software systems inspired by the Alchourrón–Gärdenfors–Makinson paradigm for belief (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  90
    Considerations in ethical decision-making and software piracy.Suzanne C. Wagner & G. Lawrence Sanders - 2001 - Journal of Business Ethics 29 (1-2):161 - 167.
    Individuals are faced with the many opportunities to pirate. The decision to pirate or not may be related to an individual''s attitudes toward other ethical issues. A person''s ethical and moral predispositions and the judgments that they use to make decisions may be consistent across various ethical dilemmas and may indicate their likelihood to pirate software. This paper investigates the relationship between religion and a theoretical ethical decision making process that an individual uses when evaluating ethical or unethical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  21.  38
    Privacy, deontic epistemic action logic and software agents.V. Wiegel, M. J. Van den Hoven & G. J. C. Lokhorst - 2005 - Ethics and Information Technology 7 (4):251-264.
    In this paper we present an executable approach to model interactions between agents that involve sensitive, privacy-related information. The approach is formal and based on deontic, epistemic and action logic. It is conceptually related to the Belief-Desire-Intention model of Bratman. Our approach uses the concept of sphere as developed by Waltzer to capture the notion that information is provided mostly with restrictions regarding its application. We use software agent technology to create an executable approach. Our agents hold beliefs about (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  20
    Learning and social software: exploring the realities in India.Jehangir Bharucha - 2018 - Journal of Information, Communication and Ethics in Society 16 (1):75-89.
    Purpose Digital India’s attempts to transform India into a digitally empowered society and knowledge economy. This research examines three questions: What is the educational importance of social media in Indian higher education? What gains and dangers does it pose when used for formal learning? Could informal learning via technology powerfully supplement learning through the formal system? Design/methodology/approach In total, 640 students were contacted through email lists provided by their institutions after these institutions had obtained their consent to participate in the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24. Abstraction and Idealization in the Formal Verification of Software Systems.Nicola Angius - 2013 - Minds and Machines 23 (2):211-226.
    Questions concerning the epistemological status of computer science are, in this paper, answered from the point of view of the formal verification framework. State space reduction techniques adopted to simplify computational models in model checking are analysed in terms of Aristotelian abstractions and Galilean idealizations characterizing the inquiry of empirical systems. Methodological considerations drawn here are employed to argue in favour of the scientific understanding of computer science as a discipline. Specifically, reduced models gained by Dataion are acknowledged as Aristotelian (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  13
    Privacy, Deontic Epistemic Action Logic and Software Agents: An Executable Approach to Modeling Moral Constraints in Complex Informational Relationships.V. Wiegel, M. Hoven & G. Lokhorst - 2005 - Ethics and Information Technology 7 (4):251-264.
    In this paper we present an executable approach to model interactions between agents that involve sensitive, privacy-related information. The approach is formal and based on deontic, epistemic and action logic. It is conceptually related to the Belief-Desire-Intention model of Bratman. Our approach uses the concept of sphere as developed by Waltzer to capture the notion that information is provided mostly with restrictions regarding its application. We use software agent technology to create an executable approach. Our agents hold beliefs about (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  8
    Computer model of control of a flat solar collector with a thermosifon circulation.Kalimoldaev M., Amirgaliyev Y., Kunelbyaev M., Merembaev T. & Sundetov T. - 2019 - Artificial Intelligence Scientific Journal 24 (1-2):75-86.
    This paper discusses the possibility of creating a digital platform based on Mojo v3 for monitoring the operation of a dual-circuit solar collector. In the proposed system, measurements are made from 6 digital sensors, 16 wires are used. Using Dallas sensors and the appropriate software, you can monitor the temperature level and the amount of heat. The use of 6 digital sensors significantly increases the efficiency of control over the system and increases the speed of data processing. The possibilities (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    Analogy-Based Approaches to Improve Software Project Effort Estimation Accuracy.S. Vijayalakshmi & V. Resmi - 2019 - Journal of Intelligent Systems 29 (1):1468-1479.
    In the discipline of software development, effort estimation renders a pivotal role. For the successful development of the project, an unambiguous estimation is necessitated. But there is the inadequacy of standard methods for estimating an effort which is applicable to all projects. Hence, to procure the best way of estimating the effort becomes an indispensable need of the project manager. Mathematical models are only mediocre in performing accurate estimation. On that account, we opt for analogy-based effort estimation by means (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  34
    A multiagent approach to modelling complex phenomena.Francesco Amigoni & Viola Schiaffonati - 2008 - Foundations of Science 13 (2):113-125.
    Designing models of complex phenomena is a difficult task in engineering that can be tackled by composing a number of partial models to produce a global model of the phenomena. We propose to embed the partial models in software agents and to implement their composition as a cooperative negotiation between the agents. The resulting multiagent system provides a global model of a phenomenon. We applied this approach in modelling two complex physiological processes: the heart rate regulation and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  11
    The future of ppen source software: Let the market decide.R. A. Spinello - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):217-233.
    According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be linked to the ongoing peer review process which typifies the open source model. In addition, programs such as Linux offer a potential challenge to the hegemony of Microsoft. Open source holds out the possibility of restraining platform leaders such as Microsoft from acting opportunistically. Some even argue that the open source code (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31. A Conceptual and Computational Model of Moral Decision Making in Human and Artificial Agents.Wendell Wallach, Stan Franklin & Colin Allen - 2010 - Topics in Cognitive Science 2 (3):454-485.
    Recently, there has been a resurgence of interest in general, comprehensive models of human cognition. Such models aim to explain higher-order cognitive faculties, such as deliberation and planning. Given a computational representation, the validity of these models can be tested in computer simulations such as software agents or embodied robots. The push to implement computational models of this kind has created the field of artificial general intelligence (AGI). Moral decision making is arguably one of the most challenging tasks for (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  32.  36
    Internet of Things and Big Data: the disruption of the value chain and the rise of new software ecosystems.Norbert Jesse - 2018 - AI and Society 33 (2):229-239.
    IoT connects devices, humans, places, and even abstract items like events. Driven by smart sensors, powerful embedded microelectronics, high-speed connectivity and the standards of the internet, IoT is on the brink of disrupting today’s value chains. Big Data, characterized by high volume, high velocity and a high variety of formats, is a result of and also a driving force for IoT. The datafication of business presents completely new opportunities and risks. To hedge the technical risks posed by the interaction between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Scientific Theories of Computational Systems in Model Checking.Nicola Angius & Guglielmo Tamburrini - 2011 - Minds and Machines 21 (2):323-336.
    Model checking, a prominent formal method used to predict and explain the behaviour of software and hardware systems, is examined on the basis of reflective work in the philosophy of science concerning the ontology of scientific theories and model-based reasoning. The empirical theories of computational systems that model checking techniques enable one to build are identified, in the light of the semantic conception of scientific theories, with families of models that are interconnected by simulation relations. And the mappings between (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  35.  5
    Multivisual Animation Character 3D Model Design Method Based on VR Technology.Leiming Li, Wenyao Zhu & Hongwei Hu - 2021 - Complexity 2021:1-12.
    For VR systems, one of its core parts is to present people with a real and immersive 3D simulation environment. This paper uses real-time computer graphics technology, three-dimensional modeling technology, and binocular stereo vision technology to study the multivisual animation character objects in virtual reality technology; designs a binocular stereo vision animation system; designs and produces a three-dimensional model; and develops a virtual multivisual animation scene application. The main research content and work performed in the text include the research of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  6
    Anti-monopoly supervision model of platform economy based on big data and sentiment.Sihan Liu - 2022 - Frontiers in Psychology 13.
    With the advent of the cloud computing era, big data technology has also developed rapidly. Due to the huge volume, variety, fast processing speed and low value density of big data, traditional data storage, extraction, transformation and analysis technologies are not suitable, so new solutions for big data application technologies are needed. However, with the development of economic theory and the practice of market economy, some links in the industrial chain of natural monopoly industries already have a certain degree of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Software Process Change, ser.A. Amescua, J. Garcia, M. I. Sanchez-Segura & F. Medina-Dominguez - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag.
     
    Export citation  
     
    Bookmark  
  38. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  9
    A process model.Eugene T. Gendlin - 2018 - Evanston, Illinois: Northwestern University Press.
    Body-environment (b-en) -- Functional cycle (fucy) -- An object -- The body and time -- Evolution, novelty, and stability -- Behavior -- Culture, symbol, and language -- Thinking with the implicit.
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  40.  4
    How does artificial intelligence work in organisations? Algorithmic management, talent and dividuation processes.Joan Rovira Martorell, Francisco Tirado, José Luís Blasco & Ana Gálvez - forthcoming - AI and Society:1-11.
    This article analyses the forms of dividuation workers undergo when they are linked to technologies, such as algorithms or artificial intelligence. It examines functionalities and operations deployed by certain types of Talent Management software and apps—UKG, Tribepad, Afiniti, RetailNext and Textio. Specifically, it analyses how talented workers materialise in relation to the profiles and the statistical models generated by such artificial intelligence machines. It argues that these operate as a nooscope that allows the transindividual plane to be quantified through (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41. A Process Model of the Emergence of Representation.Mark H. Bickhard - 1998 - In G. L. Farre & T. Oksala (eds.), Emergence, Complexity, Hierarchy, Organization, Selected and Edited Papers From the Echo Iii Conference. Acta Polytechnica Scandinavica. pp. 3-7.
    Two challenges to the very possibility of emergence are addressed, one metaphysical and one logical. The resolution of the metaphysical challenge requires a shift to a process metaphysics, while the logical challenge highlights normative emergence, and requires a shift to more powerful logical tools -- in particular, that of implicit definition. Within the framework of a process metaphysics, two levels of normative emergence are outlined: that of function and that of representation.
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  42.  10
    Applications of Uncertainty Models as Support in Smart Buildings and Ethical Computing in Edge Computing of Smart Cities.Ying Li & Trip Huwan - 2022 - Complexity 2022:1-13.
    In order to improve the effect of smart city construction, this paper combines smart buildings and ethical computing to conduct research on smart city edge computing. The new smart city architecture based on the flexible deployment of edge computing and data slicing capabilities provides support for the transformation of smart city construction from hardware embedded technology, access means, and software data processing. Moreover, this paper uses information technology to collect, process, analyze, use the information to achieve intelligence, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  32
    Kenyan health stakeholder views on individual consent, general notification and governance processes for the re-use of hospital inpatient data to support learning on healthcare systems.Daniel Mbuthia, Sassy Molyneux, Maureen Njue, Salim Mwalukore & Vicki Marsh - 2019 - BMC Medical Ethics 20 (1):3.
    Increasing adoption of electronic health records in hospitals provides new opportunities for patient data to support public health advances. Such learning healthcare models have generated ethical debate in high-income countries, including on the role of patient and public consent and engagement. Increasing use of electronic health records in low-middle income countries offers important potential to fast-track healthcare improvements in these settings, where a disproportionate burden of global morbidity occurs. Core ethical issues have been raised around the role and form of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  44. Analyzing Process Modelling as Work Activity.Irmeli Luukkonen and Juha Mykkänen - 2014 - Iris 35.
    No categories
     
    Export citation  
     
    Bookmark  
  45.  2
    The Construction of Intelligent Emotional Analysis and Marketing Model of B&B Tourism Consumption Under the Perspective of Behavioral Psychology.Wenru Guo & Daijian Tang - 2022 - Frontiers in Psychology 13.
    This manuscript constructs an intelligent sentiment analysis and marketing model for bed and breakfast consumption based on a behavioral psychology perspective. Based on the LDA theme model, the theme features and keywords of the reviews covering user feedback are explored from the text data, and the theme framework of user sentiment perception is constructed by combining previous literature on user perception in the B&B market, and the themes of user online reviews are summarized in four dimensions: practical, sensory, cognitive, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. Information-processing models of consciousness: Possibilities and problems.T. Shallice - 1988 - In Anthony J. Marcel & E. Bisiach (eds.), Consciousness in Contemporary Science. Oxford University Press.
  47.  6
    The application of artificial intelligence assistant to deep learning in teachers' teaching and students' learning processes.Yi Liu, Lei Chen & Zerui Yao - 2022 - Frontiers in Psychology 13.
    With the emergence of big data, cloud computing, and other technologies, artificial intelligence technology has set off a new wave in the field of education. The application of AI technology to deep learning in university teachers' teaching and students' learning processes is an innovative way to promote the quality of teaching and learning. This study proposed the deep learning-based assessment to measure whether students experienced an improvement in terms of their mastery of knowledge, development of abilities, and emotional experiences. It (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  29
    An architecture governance approach for Agile development by tailoring the Spotify model.Abdallah Salameh & Julian M. Bass - 2022 - AI and Society 37 (2):761-780.
    The role of software architecture in large-scale Agile development is important because several teams need to work together to release a single software product while helping to maximise teams’ autonomy. Governing and aligning Agile architecture across autonomous squads, when using the Spotify model, is a challenge because the Spotify model lacks practices for addressing Agile architecture governance. To explore how software architecture can be governed and aligned by scaling the Spotify model, we conducted a longitudinal embedded case (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  26
    Maintainable process model driven online legal expert systems.Johannes Dimyadi, Sam Bookman, David Harvey & Robert Amor - 2019 - Artificial Intelligence and Law 27 (1):93-111.
    Legal expert systems are computer applications that can mimic the consultation process of a legal expert to provide advice specific to a given scenario. The core of these systems is the experts’ knowledge captured in a sophisticated and often complex logic or rule base. Such complex systems rely on both knowledge engineers or system programmers and domain experts to maintain and update in response to changes in law or circumstances. This paper describes a pragmatic approach using process (...) techniques that enables a complex legal expert system to be maintained and updated dynamically by a domain expert such as a legal practitioner with little computing knowledge. The approach is illustrated using a case study on the design of an online expert system that allows a user to navigate through complex legal options in the domain of International Family Law. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  65
    The Process Model of Corporate Social Responsibility (CSR) Communication: CSR Communication and its Relationship with Consumers’ CSR Knowledge, Trust, and Corporate Reputation Perception.Sora Kim - 2019 - Journal of Business Ethics 154 (4):1143-1159.
    Using a national survey of US consumers, this study demonstrates the positive effects of corporate social responsibility communication factors on consumers’ CSR knowledge, trust, and perceptions of corporate reputation. The study also examines the role of a stakeholder-specific factor of consumer–company identification in the process of CSR communication. The findings suggest that the positive effects of CSR informativeness are enduring and independent of consumers’ identification levels with a company, whereas the positive consequences of the personal relevance, transparency, and factual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
1 — 50 / 993