Results for 'algorithm exploitation'

983 found
Order:
  1. Algorithm exploitation: humans are keen to exploit benevolent AI.Jurgis Karpus, Adrian Krüger, Julia Tovar Verba, Bahador Bahrami & Ophelia Deroy - 2021 - iScience 24 (6):102679.
    We cooperate with other people despite the risk of being exploited or hurt. If future artificial intelligence (AI) systems are benevolent and cooperative toward us, what will we do in return? Here we show that our cooperative dispositions are weaker when we interact with AI. In nine experiments, humans interacted with either another human or an AI agent in four classic social dilemma economic games and a newly designed game of Reciprocity that we introduce here. Contrary to the hypothesis that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  7
    How algorithms are reshaping the exploitation of labour-power: insights into the process of labour invisibilization in the platform economy.Lorenzo Cini - forthcoming - Theory and Society:1-27.
    Marx conceives of capitalism as a production mode based on the exploitation of labour-power, whose productive consumption in the labour process is considered as the main source of value creation. Capitalists seek to obscure and secure workers’ contribution to the production process, whereas workers strive to have their contribution fully recognized. The struggle between capitalists and workers over labour-time is thus central to capital’s valorization process. Hence, capital–labour antagonism is structured over the capture and exploitation of unpaid labour-time. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  15
    Algorithms for finding coalitions exploiting a new reciprocity condition.Guido Boella, Luigi Sauro & Leendert van der Torre - 2009 - Logic Journal of the IGPL 17 (3):273-297.
    We introduce a reciprocity criterion for coalition formation among goal-directed agents, which we call the indecomposable do-ut-des property. It refines an older reciprocity property, called the do-ut-des or give-to-get property by considering the fact that agents prefer to form coalitions whose components cannot be formed independently. A formal description of this property is provided as well as an analysis of algorithms and their complexity. We provide an algorithm to decide whether a coalition has the desired property, and we show (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  12
    Algorithmic Transparency, Manipulation, and Two Concepts of Liberty.Ulrik Franke - 2024 - Philosophy and Technology 37 (1):1-6.
    As more decisions are made by automated algorithmic systems, the transparency of these systems has come under scrutiny. While such transparency is typically seen as beneficial, there is a also a critical, Foucauldian account of it. From this perspective, worries have recently been articulated that algorithmic transparency can be used for manipulation, as part of a disciplinary power structure. Klenk (Philosophy & Technology 36, 79, 2023) recently argued that such manipulation should not be understood as exploitation of vulnerable victims, (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Exploratory exploitation and exploitative exploration: The phenomenology of play and the computational dynamics of search.Mihnea Moldoveanu - 2024 - Behavioral and Brain Sciences 47:e108.
    I argue for a more complicated but nonetheless computationally feasible and algorithmically intelligible interplay between exploration and exploitation and for admitting into our conceptual toolkit regimes of exploitative exploration and exploratory exploitation that can enhance the novelty and usefulness of the results of either problemistic or serendipitous search.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  18
    Algorithmic memory and the right to be forgotten on the web.Elena Esposito - 2017 - Big Data and Society 4 (1).
    The debate on the right to be forgotten on Google involves the relationship between human information processing and digital processing by algorithms. The specificity of digital memory is not so much its often discussed inability to forget. What distinguishes digital memory is, instead, its ability to process information without understanding. Algorithms only work with data without remembering or forgetting. Merely calculating, algorithms manage to produce significant results not because they operate in an intelligent way, but because they “parasitically” exploit the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  66
    Differential Evolution Algorithm Combined with Uncertainty Handling Techniques for Stochastic Reentrant Job Shop Scheduling Problem.Rong Hu, Xing Wu, Bin Qian, Jianlin Mao & Huaiping Jin - 2022 - Complexity 2022:1-11.
    This paper considers two kinds of stochastic reentrant job shop scheduling problems, i.e., the SRJSSP with the maximum tardiness criterion and the SRJSSP with the makespan criterion. Owing to the NP-complete complexity of the considered RJSSPs, an effective differential evolutionary algorithm combined with two uncertainty handling techniques, namely, DEA_UHT, is proposed to address these problems. Firstly, to reasonably control the computation cost, the optimal computing budget allocation technique is applied for allocating limited computation budgets to assure reliable evaluation and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  86
    Manipulating search engine algorithms: the case of Google.Judit Bar-Ilan - 2007 - Journal of Information, Communication and Ethics in Society 5 (2/3):155-166.
    PurposeTo investigate how search engine users manipulate the rankings of search results. Search engines employ different ranking methods in order to display the “best” results first. One of the ranking methods is PageRank, where the number of links pointing to the page influences its rank. The “anchor text,” the clickable text of the hypertext link is another “ingredient” in the ranking method. There are a number of cases where the public challenged the Google's ranking, by creating a so‐called “Google bomb” (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  11
    A Modified Salp Swarm Algorithm Based on the Perturbation Weight for Global Optimization Problems.Yuqi Fan, Junpeng Shao, Guitao Sun & Xuan Shao - 2020 - Complexity 2020:1-17.
    Metaheuristic algorithms are often applied to global function optimization problems. To overcome the poor real-time performance and low precision of the basic salp swarm algorithm, this paper introduces a novel hybrid algorithm inspired by the perturbation weight mechanism. The proposed perturbation weight salp swarm algorithm has the advantages of a broad search scope and a strong balance between exploration and exploitation and retains a relatively low computational complexity when dealing with numerous large-scale problems. A new coefficient (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. How to Discover Composition with the PC Algorithm.Clark Glymour - manuscript
    Some recent exchanges (Gebharter 2017a,2017b; Baumgartner and Cassini, 2023) concern whether composition can have conditional independence properties analogous to causal relations. If so, composition might sometimes be detectable by the application of causal search algorithms. The discussion has focused on a particular algorithm, PC (Spirtes and Glymour, 1991). PC is but one, and in many circumstances not the best, of a host of causal search algorithms that are candidates for methods of discovering composition provided appropriate statistical relations obtain. The (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  8
    On New Notions of Algorithmic Dimension, Immunity, and Medvedev Degree.David J. Webb - 2022 - Bulletin of Symbolic Logic 28 (4):532-533.
    We prove various results connected together by the common thread of computability theory.First, we investigate a new notion of algorithmic dimension, the inescapable dimension, which lies between the effective Hausdorff and packing dimensions. We also study its generalizations, obtaining an embedding of the Turing degrees into notions of dimension.We then investigate a new notion of computability theoretic immunity that arose in the course of the previous study, that of a set of natural numbers with no co-enumerable subsets. We demonstrate how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  77
    An Enhanced Differential Evolution Algorithm with Fast Evaluating Strategies for TWT-NFSP with SSTs and RTs.Rong Hu, Xing Wu, Bin Qian, Jian L. Mao & Huai P. Jin - 2020 - Complexity 2020:1-11.
    The no-wait flow-shop scheduling problem with sequence-dependent setup times and release times is a typical NP-hard problem. This paper proposes an enhanced differential evolution algorithm with several fast evaluating strategies, namely, DE_FES, to minimize the total weighted tardiness objective for the NFSP with SSTs and RTs. In the proposed DE_FES, the DE-based search is adopted to perform global search for obtaining the promising regions or solutions in solution space, and a fast local search combined with three presented strategies is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  7
    Chaotic Fruit Fly Algorithm for Solving Engineering Design Problems.M. A. El-Shorbagy - 2022 - Complexity 2022:1-19.
    The aim of this article is to present a chaotic fruit fly algorithm as an optimization approach for solving engineering design problems. In CFFA, the fruit fly algorithm, which is recognized for its durability and efficiency in addressing optimization problems, was paired with the chaotic local search method, which allows for local exploitation. CFFA will be set up to work in two phases: in the first, FFA will be used to discover an approximate solution, and in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Learning and exploiting context in agents.Bruce Edmonds - manuscript
    The use of context can considerably facilitate reasoning by restricting the beliefs reasoned upon to those relevant and providing extra information specific to the context. Despite the use and formalization of context being extensively studied both in AI and ML, context has not been much utilized in agents. This may be because many agents are only applied in a single context, and so these aspects are implicit in their design, or it may be that the need to explicitly encode information (...)
     
    Export citation  
     
    Bookmark   1 citation  
  15.  9
    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems.Wali Khan Mashwani, Ruqayya Haider & Samir Brahim Belhaouari - 2021 - Complexity 2021:1-18.
    Constrained optimization plays an important role in many decision-making problems and various real-world applications. In the last two decades, various evolutionary algorithms were developed and still are developing under the umbrella of evolutionary computation. In general, EAs are mainly categorized into nature-inspired and swarm-intelligence- based paradigms. All these developed algorithms have some merits and also demerits. Particle swarm optimization, firefly algorithm, ant colony optimization, and bat algorithm have gained much popularity and they have successfully tackled various test suites (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  75
    Modified Whale Optimization Algorithm for Solar Cell and PV Module Parameter Identification.Xiaojia Ye, Wei Liu, Hong Li, Mingjing Wang, Chen Chi, Guoxi Liang, Huiling Chen & Hailong Huang - 2021 - Complexity 2021:1-23.
    The whale optimization algorithm is a powerful swarm intelligence method which has been widely used in various fields such as parameter identification of solar cells and PV modules. In order to better balance the exploration and exploitation of WOA, we propose a novel modified WOA in which both the mutation strategy based on Levy flight and a local search mechanism of pattern search are introduced. On the one hand, Levy flight can make the algorithm get rid of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  22
    A Capability Approach to worker dignity under Algorithmic Management.Mieke Boon, Giedo Jansen, Jeroen Meijerink & Laura Lamers - 2022 - Ethics and Information Technology 24 (1).
    This paper proposes a conceptual framework to study and evaluate the impact of ‘Algorithmic Management’ (AM) on worker dignity. While the literature on AM addresses many concerns that relate to the dignity of workers, a shared understanding of what worker dignity means, and a framework to study it, in the context of software algorithms at work is lacking. We advance a conceptual framework based on a Capability Approach (CA) as a route to understanding worker dignity under AM. This paper contributes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  16
    The Psychology of Good Judgment Frequency Formats and Simple Algorithms.Gerd Gigerenzer - 1996 - Medical Decision Making 16 (3):273-280.
    Mind and environment evolve in tandem—almost a platitude. Much of judgment and decision making research, however, has compared cognition to standard statistical models, rather than to how well it is adapted to its environment. The author argues two points. First, cognitive algorithms are tuned to certain information formats, most likely to those that humans have encountered during their evolutionary history. In par ticular, Bayesian computations are simpler when the information is in a frequency format than when it is in a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   14 citations  
  19.  9
    Human Variability and the Explore–Exploit Trade‐Off in Recommendation.Scott Cheng-Hsin Yang, Chirag Rank, Jake A. Whritner, Olfa Nasraoui & Patrick Shafto - 2023 - Cognitive Science 47 (4):e13279.
    The enormous scale of the available information and products on the Internet has necessitated the development of algorithms that intermediate between options and human users. These algorithms attempt to provide the user with relevant information. In doing so, the algorithms may incur potential negative consequences stemming from the need to select items about which it is uncertain to obtain information about users versus the need to select items about which it is certain to secure high ratings. This tension is an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  28
    A Hybrid Nature-Inspired Artificial Bee Colony Algorithm for Uncapacitated Examination Timetabling Problems.Mohammed A. Awadallah, Mohammed Azmi Al-Betar, Ahamad Tajudin Khader & Asaju La’aro Bolaji - 2015 - Journal of Intelligent Systems 24 (1):37-54.
    This article presents a Hybrid Artificial Bee Colony for uncapacitated examination timetabling. The ABC algorithm is a recent metaheuristic population-based algorithm that belongs to the Swarm Intelligence technique. Examination timetabling is a hard combinatorial optimization problem of assigning examinations to timeslots based on the given hard and soft constraints. The proposed hybridization comes in two phases: the first phase hybridized a simple local search technique as a local refinement process within the employed bee operator of the original ABC, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  15
    Best Polynomial Harmony Search with Best β-Hill Climbing Algorithm.Eugene Santos & Iyad Abu Doush - 2020 - Journal of Intelligent Systems 30 (1):1-17.
    Harmony Search Algorithm (HSA) is an evolutionary algorithm which mimics the process of music improvisation to obtain a nice harmony. The algorithm has been successfully applied to solve optimization problems in different domains. A significant shortcoming of the algorithm is inadequate exploitation when trying to solve complex problems. The algorithm relies on three operators for performing improvisation: memory consideration, pitch adjustment, and random consideration. In order to improve algorithm efficiency, we use roulette wheel (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  15
    Industry 4.0-Driven Development of Optimization Algorithms: A Systematic Overview.Róbert Csalódi, Zoltán Süle, Szilárd Jaskó, Tibor Holczinger & János Abonyi - 2021 - Complexity 2021:1-22.
    The Fourth Industrial Revolution means the digital transformation of production systems. Cyber-physical systems allow for the horizontal and vertical integration of these production systems as well as the exploitation of the benefits via optimization tools. This article reviews the impact of Industry 4.0 solutions concerning optimization tasks and optimization algorithms, in addition to the identification of the new R&D directions driven by new application options. The basic organizing principle of this overview of the literature is to explore the requirements (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  1
    A Pseudo-Deterministic Noisy Extremal Optimization algorithm for the pairwise connectivity Critical Node Detection Problem.Noémi Gaskó, Mihai-Alexandru Suciu, Rodica Ioana Lung & Tamás Képes - forthcoming - Logic Journal of the IGPL.
    The critical node detection problem is a central task in computational graph theory due to its large applicability, consisting in deleting $k$ nodes to minimize a certain graph measure. In this article, we propose a new Extremal Optimization-based approach, the Pseudo-Deterministic Noisy Extremal Optimization (PDNEO) algorithm, to solve the Critical Node Detection variant in which the pairwise connectivity is minimized. PDNEO uses an adaptive pseudo-deterministic parameter to switch between random nodes and articulation points during the search, as well as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  8
    A Dynamic Opposite Learning Assisted Grasshopper Optimization Algorithm for the Flexible JobScheduling Problem.Yi Feng, Mengru Liu, Yuqian Zhang & Jinglin Wang - 2020 - Complexity 2020:1-19.
    Job shop scheduling problem is one of the most difficult optimization problems in manufacturing industry, and flexible job shop scheduling problem is an extension of the classical JSP, which further challenges the algorithm performance. In FJSP, a machine should be selected for each process from a given set, which introduces another decision element within the job path, making FJSP be more difficult than traditional JSP. In this paper, a variant of grasshopper optimization algorithm named dynamic opposite learning assisted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  13
    Stochastic Travelling Advisor Problem Simulation with a Case Study: A Novel Binary Gaining-Sharing Knowledge-Based Optimization Algorithm.Said Ali Hassan, Yousra Mohamed Ayman, Khalid Alnowibet, Prachi Agrawal & Ali Wagdy Mohamed - 2020 - Complexity 2020:1-15.
    This article proposes a new problem which is called the Stochastic Travelling Advisor Problem in network optimization, and it is defined for an advisory group who wants to choose a subset of candidate workplaces comprising the most profitable route within the time limit of day working hours. A nonlinear binary mathematical model is formulated and a real application case study in the occupational health and safety field is presented. The problem has a stochastic nature in travelling and advising times since (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  6
    Big Archive-Assisted Ensemble of Many-Objective Evolutionary Algorithms.Wen Zhong, Jian Xiong, Anping Lin, Lining Xing, Feilong Chen & Yingwu Chen - 2021 - Complexity 2021:1-17.
    Multiobjective evolutionary algorithms have witnessed prosperity in solving many-objective optimization problems over the past three decades. Unfortunately, no one single MOEA equipped with given parameter settings, mating-variation operator, and environmental selection mechanism is suitable for obtaining a set of solutions with excellent convergence and diversity for various types of MaOPs. The reality is that different MOEAs show great differences in handling certain types of MaOPs. Aiming at these characteristics, this paper proposes a flexible ensemble framework, namely, ASES, which is highly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  10
    Self-Organized Fission-Fusion Control Algorithm for Flocking Systems Based on Intermittent Selective Interaction.Panpan Yang, Maode Yan, Jiacheng Song & Ye Tang - 2019 - Complexity 2019:1-12.
    In nature, gregarious animals, insects, or bacteria usually exhibit paradoxical behaviors in the form of group fission and fusion, which exerts an important influence on group’s pattern formation, information transfer, and epidemiology. However, the fission-fusion dynamics have received little attention compared to other flocking behavior. In this paper, an intermittent selective interaction based control algorithm for the self-organized fission-fusion behavior of flocking system is proposed, which bridges the gap between the two conflicting behaviors in a unified fashion. Specifically, a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  9
    Eurasian oystercatcher optimiser: New meta-heuristic algorithm.Mohammed Yousif, Farah Maath Jasim, Wisam K. Jummar & Ahmad Salim - 2022 - Journal of Intelligent Systems 31 (1):332-344.
    Modern optimisation is increasingly relying on meta-heuristic methods. This study presents a new meta-heuristic optimisation algorithm called Eurasian oystercatcher optimiser (EOO). The EOO algorithm mimics food behaviour of Eurasian oystercatcher (EO) in searching for mussels. In EOO, each bird (solution) in the population acts as a search agent. The EO changes the candidate mussel according to the best solutions to finally eat the best mussel (optimal result). A balance must be achieved among the size, calories, and energy of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  32
    680 philosophical abstracts.Exploitation Prostitution & Karen Green Taboo - 1990 - Philosophy 90 (251).
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Using cross-lingual information to cope with underspecification in formal ontologies.Werner Ceusters, Ignace Desimpel, Barry Smith & Stefan Schulz - 2003 - Studies in Health Technology and Informatics 95:391-396.
    Description logics and other formal devices are frequently used as means for preventing or detecting mistakes in ontologies. Some of these devices are also capable of inferring the existence of inter-concept relationships that have not been explicitly entered into an ontology. A prerequisite, however, is that this information can be derived from those formal definitions of concepts and relationships which are included within the ontology. In this paper, we present a novel algorithm that is able to suggest relationships among (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  25
    Ga の探索における uv 現象と uv 構造仮説.Kobayashi Sigenobu Ikeda Kokolo - 2002 - Transactions of the Japanese Society for Artificial Intelligence 17:239-246.
    Genetic Algorithms(GAs) are effective approximation algorithms which focus on “hopeful area” in the searching process. However, in harder problems, it is often very difficult to maintain a favorable trade-off between exploitation and exploration. All individuals leave the big-valley including the global optimum, and concentrate on another big-valley including a local optimum often. In this paper, we define such a situation on conventional GAs as the “UV-phenomenon”, and suggest UV-structures as hard landscape structures that will cause the UV-phenomenon. We introduce (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  9
    A Parameter-Free Model Comparison Test Using Differential Algebra.Heather A. Harrington, Kenneth L. Ho & Nicolette Meshkat - 2019 - Complexity 2019:1-15.
    We present a method for rejecting competing models from noisy time-course data that does not rely on parameter inference. First we characterize ordinary differential equation models in only measurable variables using differential-algebra elimination. This procedure gives input-output equations, which serve as invariants for time series data. We develop a model comparison test using linear algebra and statistics to reject incorrect models from their invariants. This algorithm exploits the dynamic properties that are encoded in the structure of the model equations (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  12
    Generalization and Search in Risky Environments.Eric Schulz, Charley M. Wu, Quentin J. M. Huys, Andreas Krause & Maarten Speekenbrink - 2018 - Cognitive Science 42 (8):2592-2620.
    How do people pursue rewards in risky environments, where some outcomes should be avoided at all costs? We investigate how participant search for spatially correlated rewards in scenarios where one must avoid sampling rewards below a given threshold. This requires not only the balancing of exploration and exploitation, but also reasoning about how to avoid potentially risky areas of the search space. Within risky versions of the spatially correlated multi‐armed bandit task, we show that participants’ behavior is aligned well (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  5
    Les perspectives ouvertes par la mise à disposition du public des décisions de justice : quelle place et quelle régulation pour la justice prédictive?Paolo Giambiasi - 2018 - Archives de Philosophie du Droit 60 (1):117-123.
    L’ouverture au public des décisions de justice prévue par les articles 20 et 21 de la loi du 7 octobre 2016 pour une République numérique va favoriser le traitement des données figurant au sein des décisions par des outils automatisés. Cette exploitation ouvre des perspectives nouvelles pour les justiciables et les acteurs du droit, notamment de meilleure compréhension de la justice, de prévisibilité accrue des décisions rendues par les juridictions ou de création de valeur économique 2. Elle implique toutefois (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Concept Combination in Weighted Logic.Guendalina Righetti, Claudio Masolo, Nicolas Toquard, Oliver Kutz & Daniele Porello - 2021 - In Guendalina Righetti, Claudio Masolo, Nicolas Toquard, Oliver Kutz & Daniele Porello (eds.), Proceedings of the Joint Ontology Workshops 2021 Episode {VII:} The Bolzano Summer of Knowledge co-located with the 12th International Conference on Formal Ontology in Information Systems {(FOIS} 2021), and the 12th Internati.
    We present an algorithm for concept combination inspired and informed by the research in cognitive and experimental psychology. Dealing with concept combination requires, from a symbolic AI perspective, to cope with competitive needs: the need for compositionality and the need to account for typicality effects. Building on our previous work on weighted logic, the proposed algorithm can be seen as a step towards the management of both these needs. More precisely, following a proposal of Hampton [1], it combines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  63
    Novelty and Inductive Generalization in Human Reinforcement Learning.Samuel J. Gershman & Yael Niv - 2015 - Topics in Cognitive Science 7 (3):391-415.
    In reinforcement learning, a decision maker searching for the most rewarding option is often faced with the question: What is the value of an option that has never been tried before? One way to frame this question is as an inductive problem: How can I generalize my previous experience with one set of options to a novel option? We show how hierarchical Bayesian inference can be used to solve this problem, and we describe an equivalence between the Bayesian model and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Sentence Planning as Description Using Tree Adjoining Grammar.Matthew Stone - unknown
    We present an algorithm for simultaneously constructing both the syntax and semantics of a sentence using a Lexicalized Tree Adjoining Grammar (LTAG). This approach captures naturally and elegantly the interaction between pragmatic and syntactic constraints on descriptions in a sentence, and the inferential interactions between multiple descriptions in a sentence. At the same time, it exploits linguistically motivated, declarative specifications of the discourse functions of syntactic constructions to make contextually appropriate syntactic choices.
     
    Export citation  
     
    Bookmark   9 citations  
  38.  78
    Adjacency-Faithfulness and Conservative Causal Inference.Joseph Ramsey, Jiji Zhang & Peter Spirtes - 2006 - In R. Dechter & T. Richardson (eds.), Proceedings of the Twenty-Second Conference Conference on Uncertainty in Artificial Intelligence (2006). Arlington, Virginia: AUAI Press. pp. 401-408.
    Most causal discovery algorithms in the literature exploit an assumption usually referred to as the Causal Faithfulness or Stability Condition. In this paper, we highlight two components of the condition used in constraint-based algorithms, which we call “Adjacency-Faithfulness” and “Orientation- Faithfulness.” We point out that assuming Adjacency-Faithfulness is true, it is possible to test the validity of Orientation- Faithfulness. Motivated by this observation, we explore the consequence of making only the Adjacency-Faithfulness assumption. We show that the familiar PC algorithm (...)
    Direct download  
     
    Export citation  
     
    Bookmark   13 citations  
  39. Digital Working Lives: Worker Autonomy and the Gig Economy.Tim Christiaens - 2022 - Rowman & Littlefield Publishers.
    Christiaens argues that digital technologies are fundamentally undermining workers’ autonomy by enacting systems of surveillance that lead to exploitation, alienation, and exhaustion. For a more sustainable future of work, digital technologies should support human development instead of subordinating it to algorithmic control.
  40. Quantum computation and pseudotelepathic games.Jeffrey Bub - 2008 - Philosophy of Science 75 (4):458-472.
    A quantum algorithm succeeds not because the superposition principle allows ‘the computation of all values of a function at once’ via ‘quantum parallelism’, but rather because the structure of a quantum state space allows new sorts of correlations associated with entanglement, with new possibilities for information‐processing transformations between correlations, that are not possible in a classical state space. I illustrate this with an elementary example of a problem for which a quantum algorithm is more efficient than any classical (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  21
    Defining Digital Authoritarianism.James S. Pearson - forthcoming - Philosophy and Technology.
    It is becoming increasingly common for authoritarian regimes to leverage digital technologies to surveil, repress and manipulate their citizens. Experts typically refer to this practice as “digital authoritarianism” (DA). Existing definitions of DA consistently presuppose a politically repressive agent intentionally exploiting digital technology in pursuit of authoritarian ends. I refer to this as the "intention-based definition." This paper argues that this definition is untenable as a general description of DA. I begin by illustrating the current predominance of the intention-based definition (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Mechanizmy predykcyjne i ich normatywność [Predictive mechanisms and their normativity].Michał Piekarski - 2020 - Warszawa, Polska: Liberi Libri.
    The aim of this study is to justify the belief that there are biological normative mechanisms that fulfill non-trivial causal roles in the explanations (as formulated by researchers) of actions and behaviors present in specific systems. One example of such mechanisms is the predictive mechanisms described and explained by predictive processing (hereinafter PP), which (1) guide actions and (2) shape causal transitions between states that have specific content and fulfillment conditions (e.g. mental states). Therefore, I am guided by a specific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43. Leaky Levels and the Case for Proper Embodiment.Mog Stapleton - 2016 - In G. Etzelmüller & C. Tewes (eds.), Embodiment in Evolution and Culture. Tübingen, Germany: pp. 17-30.
    In this chapter I present the thesis of Proper Embodiment: the claim that (at least some of) the details of our physiology matter to cognition and consciousness in a fundamental way. This thesis is composed of two sub-claims: (1) if we are to design, build, or evolve artificial systems that are cognitive in the way that we are, these systems will have to be internally embodied, and (2) the exploitation of the particular internal embodiment that allows systems to evolve (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Hijacking Epistemic Agency - How Emerging Technologies Threaten our Wellbeing as Knowers.John Dorsch - 2022 - Proceedings of the 2022 Aaai/Acm Conference on Ai, Ethics, and Society 1.
    The aim of this project to expose the reasons behind the pandemic of misinformation (henceforth, PofM) by examining the enabling conditions of epistemic agency and the emerging technologies that threaten it. I plan to research the emotional origin of epistemic agency, i.e. on the origin of our capacity to acquire justification for belief, as well as on the significance this emotional origin has for our lives as epistemic agents in our so-called Misinformation Age. This project has three objectives. First, I (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures.Daniel Susser - 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society 1.
    For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  46. Précis of simple heuristics that make us Smart.Peter M. Todd & Gerd Gigerenzer - 2000 - Behavioral and Brain Sciences 23 (5):727-741.
    How can anyone be rational in a world where knowledge is limited, time is pressing, and deep thought is often an unattainable luxury? Traditional models of unbounded rationality and optimization in cognitive science, economics, and animal behavior have tended to view decision-makers as possessing supernatural powers of reason, limitless knowledge, and endless time. But understanding decisions in the real world requires a more psychologically plausible notion of bounded rationality. In Simple heuristics that make us smart (Gigerenzer et al. 1999), we (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   65 citations  
  47.  10
    The World Computer: Derivative Conditions of Racial Capitalism.Jonathan Beller - 2021 - Duke University Press.
    In _The World Computer_ Jonathan Beller forcefully demonstrates that the history of commodification generates information itself. Out of the omnipresent calculus imposed by commodification, information emerges historically as a new money form. Investigating its subsequent financialization of daily life and colonization of semiotics, Beller situates the development of myriad systems for quantifying the value of people, objects, and affects as endemic to racial capitalism and computation. Built on oppression and genocide, capital and its technical result as computation manifest as racial (...)
    No categories
  48.  42
    A novel network framework using similar-to-different learning strategy.Bhanu Prakash Battula & R. Satya Prasad - 2015 - AI and Society 30 (1):129-138.
    Most of the existing classification techniques concentrate on learning the datasets as a single similar unit, in spite of so many differentiating attributes and complexities involved. However, traditional classification techniques are required to analyze the datasets prior to learning, and if not doing so, they loss their performance in terms of accuracy and AUC. To this end, many of the machine learning problems can be very easily solved just by carefully observing human learning and training nature and then mimicking the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  95
    Bayesian reverse-engineering considered as a research strategy for cognitive science.Carlos Zednik & Frank Jäkel - 2016 - Synthese 193 (12):3951-3985.
    Bayesian reverse-engineering is a research strategy for developing three-level explanations of behavior and cognition. Starting from a computational-level analysis of behavior and cognition as optimal probabilistic inference, Bayesian reverse-engineers apply numerous tweaks and heuristics to formulate testable hypotheses at the algorithmic and implementational levels. In so doing, they exploit recent technological advances in Bayesian artificial intelligence, machine learning, and statistics, but also consider established principles from cognitive psychology and neuroscience. Although these tweaks and heuristics are highly pragmatic in character and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  50.  15
    “The revolution will not be supervised”: Consent and open secrets in data science.Abibat Rahman-Davies, Madison W. Green & Coleen Carrigan - 2021 - Big Data and Society 8 (2).
    The social impacts of computer technology are often glorified in public discourse, but there is growing concern about its actual effects on society. In this article, we ask: how does “consent” as an analytical framework make visible the social dynamics and power relations in the capture, extraction, and labor of data science knowledge production? We hypothesize that a form of boundary violation in data science workplaces—gender harassment—may correlate with the ways humans’ lived experiences are extracted to produce Big Data. The (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 983