Philosophy of Computing and Information

Edited by Giuseppe Primiero (Università degli Studi di Milano)
Contents
88 found
Order:
1 — 50 / 88
Material to categorize
  1. Reliability Gaps Between Groups in COMPAS Dataset.Tim Räz - 2024 - In - Acm (ed.), FAccT '24: Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency. New York NY United States: Association for Computing Machinery. pp. 113–126.
  2. The text-building function of names and nicknames in 'Sverris saga' and 'Boglunga sogur'.Anton Zimmerling - 1994 - In Sverrir Tómasson (ed.), The Ninth International Saga Conference. The Contemporary sagas. Akureyri, 1994. Reykjavík: Stofnun Árna Magnússonar. pp. 892-906.
    This paper explores the hypothesis that proper names serve as anchors identifying the individuals in the possible or real world. This hypothesis is tested on Old Icelandic narratives. A prominent feature of Old Icelandic sagas is that the narrative matter is not quite new. A Saga is reliable iff it refers to the events relevant for its audience and accepted as true by the whole community. I argue that proper names must be regarded as references to the background knowledge of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  3. How Nature Moves from Zero to One.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
    How nature moves from zero to one? Nothing is moving.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  4. The 27 27 Matrix.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
    All the world's a stage. (A 27 27 Matrix.).
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  5. The Tanglewood Trilogy.Yardley Ilexa - 2002 - Houston, Texas: Opposite Approach Publications.
    The Tanglewood Trilogy (2002) Book One: Relative Realities, Book Two: Opposite Approach, Book Three: Partial Truth. Conservation of the Circle explains General Relativity, Complementary Opposition, and 50-50 Reality (50-50 as the constant and the norm). This gives humans the basis for everything in mathematics, science, art, and athletics (symbolic systems universally). Conservation of the Circle solves the grounding problem (where the absolute is relative because the relative is absolute) because an uber-universal circular-linear relationship (technically, pi in mathematics) is the only (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6. Reliability in Machine Learning.Thomas Grote, Konstantin Genin & Emily Sullivan - 2024 - Philosophy Compass 19 (5):e12974.
    Issues of reliability are claiming center-stage in the epistemology of machine learning. This paper unifies different branches in the literature and points to promising research directions, whilst also providing an accessible introduction to key concepts in statistics and machine learning – as far as they are concerned with reliability.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7. Chương trình máy tính bayesvl trong môi trường R: Đóng góp Việt cho khoa học thế giới.Hoàng Phương Hạnh - 2019 - Khoa Học Và Phát Triển (13/06/2019).
    Mới đây, chương trình máy tính ‘bayesvl’ chạy trên môi trường R do TS. Vương Quân Hoàng và kĩ sư Lã Việt Phương (Trung tâm Nghiên cứu Xã hội Liên ngành ISR, Đại học Phenikaa) thiết kế và phát triển chính thức được ra mắt trên CRAN - hệ thống thư viện chuẩn của R...
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI.Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Trang Thông Tin Điện Tử Hội Đồng Lý Luận Trung Ương.
    Trong bối cảnh các hoạt động kinh tế và xã hội ngày càng được kết nối tốt hơn thông qua IoT, và sắp tới đây là tiềm năng tích hợp AI vào hầu như mọi mặt của đời sống ở cả thế giới thực và thế giới ảo, thì không chỉ cá nhân, mà cả doanh nghiệp và quốc gia cũng sẽ phải đối mặt với các thách thức chưa từng có tiền lệ đối với rủi ro về an ninh (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  9. The Cost of Prediction.Johannes Lenhard, Simon Stephan & Hans Hasse - manuscript
    This paper examines a looming reproducibility crisis in the core of the hard sciences. Namely, it concentrates on molecular modeling and simulation (MMS), a family of methods that predict properties of substances through computing interactions on a molecular level and that is widely popular in physics, chemistry, materials science, and engineering. The paper argues that in order to make quantitative predictions, sophisticated models are needed which have to be evaluated with complex simulation procedures that amalgamate theoretical, technological, and social factors (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  10. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical image (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. The Use of Machine Learning Methods for Image Classification in Medical Data.Destiny Agboro - forthcoming - International Journal of Ethics.
    Integrating medical imaging with computing technologies, such as Artificial Intelligence (AI) and its subsets: Machine learning (ML) and Deep Learning (DL) has advanced into an essential facet of present-day medicine, signaling a pivotal role in diagnostic decision-making and treatment plans (Huang et al., 2023). The significance of medical imaging is escalated by its sustained growth within the realm of modern healthcare (Varoquaux and Cheplygina, 2022). Nevertheless, the ever-increasing volume of medical images compared to the availability of imaging experts. Biomedical experts (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  12. Comparative Analysis of Deep Learning and Naïve Bayes for Language Processing Task.Olalere Abiodun - forthcoming - International Journal of Research and Innovation in Applied Sciences.
    Text classification is one of the most important task in natural language processing, In this research, we carried out several experimental research on three (3) of the most popular Text classification NLP classifier in Convolutional Neural Network (CNN), Multinomial Naive Bayes (MNB), and Support Vector Machine (SVN). In the presence of enough training data, Deep Learning CNN work best in all parameters for evaluation with 77% accuracy, followed by SVM with accuracy of 76%, and multinomial Bayes with least performance of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Computation and Physical Systems
  1. Ingenious Genes: How Gene Regulation Networks Evolve to Control Development.Roger Sansom - 2011 - MIT Press.
Computers
  1. Resistance Money: A Philosophical Case for Bitcoin.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2024 - Routledge.
    The book develops a comprehensive and measured case that bitcoin is a net benefit to the world, despite its imperfections. Resistance Money is intended for all, from the clueless to the specialist, from the proponent to the die-hard skeptic, and everyone in between.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Taking It Not at Face Value: A New Taxonomy for the Beliefs Acquired from Conversational AIs.Shun Iizuka - forthcoming - Techné: Research in Philosophy and Technology.
    One of the central questions in the epistemology of conversational AIs is how to classify the beliefs acquired from them. Two promising candidates are instrument-based and testimony-based beliefs. However, the category of instrument-based beliefs faces an intrinsic problem, and a challenge arises in its application. On the other hand, relying solely on the category of testimony-based beliefs does not encompass the totality of our practice of using conversational AIs. To address these limitations, I propose a novel classification of beliefs that (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Implementing Computations
  1. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between cyber security (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
Computer Simulation
  1. Advances in Social Science, Education and Humanities Research. Proceedings of the International Conference Communicative Strategies of Information Society (CSIS 2018).Daria Bylieva & Tatiana Nam (eds.) - 2018
    Remove from this list  
     
    Export citation  
     
    Bookmark  
Simulation and Reality
  1. Implications of computer science theory for the simulation hypothesis.David Wolpert - manuscript
    The simulation hypothesis has recently excited renewed interest, especially in the physics and philosophy communities. However, the hypothesis specifically concerns {computers} that simulate physical universes, which means that to properly investigate it we need to couple computer science theory with physics. Here I do this by exploiting the physical Church-Turing thesis. This allows me to introduce a preliminary investigation of some of the computer science theoretic aspects of the simulation hypothesis. In particular, building on Kleene's second recursion theorem, I prove (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. Zombies in the Basement? Ghosts in the Floorboards?Walter Barta - manuscript
    Do the hard problem of consciousness and the simulation argument potentially resolve each other? Here we will argue for four possible views: that consciousness may be possible only (a) outside of, (b) inside and/or outside of, (c) inside of, or (d) interfacing with simulations. The first two of these views have been developed at length by David Chalmers and are used as jumping off points to introduce and develop the latter two views here. If any one of these views could (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Simulation Hypothesis
  1. Proof We Live in a Simulation.Phillip Angelos - manuscript
    Space Time Information (a thought experiment) proves that protein evolution is the result of computation: possibly due to a simulation.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Philosophy of Computation, Miscellaneous
Computers in Philosophy
  1. Faceless Gazes. Rhetoric and Politics of the Google Street View.Filippo Fimiani - 2023 - Paradigmi. Rivista di Critica Filosofica 41 (3):529-540.
    Potentialities of attention and distraction with respect to images are critically reprised by Neapolitan artist Domenico Antonio Mancini. In Landscapes (2019), Google Street View addresses painted on canvases take the place of outlying areas of Italian cities, and of canonical oil ‘vedute’ paintings, obliging the viewer to switch from aesthetic absorption to a multitasking, reflexive attention enabled by the tools of mobile devices and the operative agency between the displayed and depicted images. Attracted by the ephemeral, geo-localized vistas displayed on (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Databases
See also: Social Media
Data Privacy
  1. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. Free Internet Access as a Human Right.Merten Reglitz - 2024 - Cambridge: Cambridge University Press.
    "Merten Reglitz makes a case for a new human right to free Internet access, arguing it is crucial for protecting and advancing fundamental moral interests. He examines the risks the Internet poses to our most important rights if it is not safeguarded by public institutions"--.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  1. The Mind’s Eye: Cognitive and Applied Aspects of Eye Movement Research.H. Deubel & J. R. In Hyönä (eds.) - 2003
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Pretenders to the Throne: A commentary on Alice Dreger's ‘The controversy surrounding The Man Who Would Be Queen: A case history of the politics of science, identity, and sex in the internet age’.Talia Mae Bettcher - 2008 - Archives of Sexual Behavior 7 (3):430-33.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  3. A Web of Our Own Making: The Nature of Digital Antón Barba-Kay (review). [REVIEW]Matthew Stripling - 2024 - Review of Metaphysics 77 (3):537-538.
    BARBA-KAY, Antón. A Web of Our Own Making: The Nature of Digital Formation. Cambridge: Cambridge University Press, 2023. x + 295 pp. Cloth, $29.99—This is a truly remarkable book, brimming with extensive research, penetrating insight, and poetic beauty. The book’s main theme is the cultural revolution caused by digital technology. As the book shows, we have always been shaped by our tools. With new ways of doing come new ways of being human. In this way, the digital revolution is continuous (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
Software
  1. Do modo de existência das entidades de software.Eder Fabiano Souza Costa - 2022 - Cadernos PET-Filosofia (Parana) 21 (1).
    O presente artigo discute alguns conceitos de linguagem de programação, buscando abrir uma discussão ontológica sobre os seres técnicos. Partindo de uma breve análise histórica e de conceitos da filosofia do séc. XX, problematiza-se as noções de abstrato e concreto dessas entidades, fazendo uma análise do dualismo hardware-software a partir da concepção hegemônica do hilemorfismo aristotélico e usando de exemplos de linguagem computacional para discutir uma certa ontologia desses seres. Fundamenta-se em Gilbert Simondon uma hipótese segundo a qual o computador (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Ethics and Information Technology.Göran Collste (ed.) - 1998 - Delhi: New Academic Publishers.
    The Ethical Issues Underlying The Computer-Ization And Information Technology Are The Subject Of The Essays Collected In This Book. Computer Ethics And Information Ethics Are New Branches Of Applied Ethics.In This Book Different Applications Of Information Technology (It) Are Assessed From An Ethical Perspective. How Eill The Global Information Infrastructure Affect ConditionsFor Democracy? Is It Possible To Maintain Values Like Autonomy And Privacy In TheComputerized Society? What Ethical Principles Are Needed And What Virtues ShouldBe Promoted Among The Professionals Involved? How (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  3. Exploring Open-Source Software Ecosystems for Hardware Development.J. C. Mariscal-Melgar, Pieter Hijma, Martin Häuer, Martin Schott, Julian Stirling, Timm Wille, Manuel Moritz & Tobias Redlich - 2024 - In Manuel Moritz, Tobias Redlich, Sonja Buxbaum-Conradi & Jens P. Wulfsberg (eds.), Global collaboration, local production: Fab City als Modell für Kreislaufwirtschaft und nachhaltige Entwicklung. Springer Fachmedien Wiesbaden. pp. 187-199.
    Open-Source Hardware (OSH) and software ecosystems enable a collaborative development and manufacturing of physical artifacts. As we move towards new paradigms of production and consumption – libre software toolchains for hardware development warrant special attention. This chapter explores libre software, OSH, and software ecosystems to exemplify, illustrate, and provide food for thought to the curious reader to understand current trends in the Open-Source Hardware movement.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. Towards a Realist Metaphysics of Software Maintenance.Keith Begley - 2024 - In Mark Thomas Young & Mark Coeckelbergh (eds.), Maintenance and Philosophy of Technology: Keeping Things Going. New York: Routledge. pp. 162–183.
    This chapter discusses the nature of software maintenance in light of software’s ontological status. A realist view of software need not commit us to the otiose position that software maintenance is impossible. Many philosophers and computer scientists have been concerned with drawing attention to software’s dual nature, its being both symbolic and physical, abstract and concrete. There are strong connections to be found between this topic and recent investigations in the philosophy of linguistics, particularly the metaphysics of words. It is (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering.Gerard O'Regan - 2024 - Springer Nature Switzerland.
    This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the law Includes key learning topics, summaries, and review questions in each chapter, (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6. Trust, artificial intelligence and software practitioners: an interdisciplinary agenda.Sarah Pink, Emma Quilty, John Grundy & Rashina Hoda - forthcoming - AI and Society:1-14.
    Trust and trustworthiness are central concepts in contemporary discussions about the ethics of and qualities associated with artificial intelligence (AI) and the relationships between people, organisations and AI. In this article we develop an interdisciplinary approach, using socio-technical software engineering and design anthropological approaches, to investigate how trust and trustworthiness concepts are articulated and performed by AI software practitioners. We examine how trust and trustworthiness are defined in relation to AI across these disciplines, and investigate how AI, trust and trustworthiness (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  1. A Clearer Understanding of Infinity.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
Conceptions of Information
  1. Stanford Encyclopaedia of Philosophy.Luciano Floridi (ed.) - 2008
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Conservation of a Circle.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
Information Theory
  1. Ruyer and his elements towards a metaphysics of information’s origination: Critical notice on Raymond Ruyer, Cybernetics and the Origin of Information. [REVIEW]Philippe Gagnon - forthcoming - Technophany, a Journal for Philosophy and Technology.
    Review of: Raymond Ruyer, Cybernetics and the Origin of Information, translated by Amélie Berger-Soraruff, Andrew Iliadis, Daniel W. Smith, and Ashley Woodward, with an introduction by Ashley Woodward (Lanham/London: Rowman & Littlefield, 2024), xxvii-214 pages.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Integrated Information Theory 4.0 is both Weakly Panpsychist and Strongly Dualist, but many Theories of Consciousness are also Prone to It. [REVIEW]Sergey B. Yurchenko - 2024 - Journal of Neurophilosophy 3 (1).
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Information theory and statistical mechanics.Edwin T. Jaynes - 1963 - In K. W. Ford (ed.), Statistical Physics. Benjamin.
    Remove from this list  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Information theory and statistical mechanics.Edwin T. Jaynes - 1957 - Physical Review 106:620–630.
    Information theory and statistical mechanics.
    Remove from this list  
     
    Export citation  
     
    Bookmark   36 citations  
Misinformation
  1. What makes audiences resilient to disinformation? Integrating micro, meso, and macro factors based on a systematic literature review.Jülide Kont, Wim Elving, Marcel Broersma & Çiğdem Bozdağ - forthcoming - Communications.
    Despite increased attention since 2015, there is little consensus on why audiences believe or share disinformation. In our study, we propose a shift in analytical perspective by applying the concept of resilience. Through a systematic literature review (n = 95), we identify factors that have been linked to individuals’ resilience and vulnerability to disinformation thus far. Our analysis reveals twelve factors: thinking styles, political ideology, worldview and beliefs, pathologies, knowledge, emotions, (social) media use, demographics, perceived control, trust, culture, and environment. (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Misinformation, Content Moderation, and Epistemology: Protecting Knowledge.Keith Raymond Harris - 2024 - Routledge.
    This book argues that misinformation poses a multi-faceted threat to knowledge, while arguing that some forms of content moderation risk exacerbating these threats. It proposes alternative forms of content moderation that aim to address this complexity while enhancing human epistemic agency. The proliferation of fake news, false conspiracy theories, and other forms of misinformation on the internet and especially social media is widely recognized as a threat to individual knowledge and, consequently, to collective deliberation and democracy itself. This book argues (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
Physics of Information
  1. The Circular Theory.Ilexa Yardley - 2010 - Integrated Thought Concepts.
    Conservation of the Circle is the core (and, thus, the only) dynamic in Nature.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Logic and Information
  1. Logic in mathematics and computer science.Richard Zach - forthcoming - In Filippo Ferrari, Elke Brendel, Massimiliano Carrara, Ole Hjortland, Gil Sagi, Gila Sher & Florian Steinberger (eds.), Oxford Handbook of Philosophy of Logic. Oxford, UK: Oxford University Press.
    Logic has pride of place in mathematics and its 20th century offshoot, computer science. Modern symbolic logic was developed, in part, as a way to provide a formal framework for mathematics: Frege, Peano, Whitehead and Russell, as well as Hilbert developed systems of logic to formalize mathematics. These systems were meant to serve either as themselves foundational, or at least as formal analogs of mathematical reasoning amenable to mathematical study, e.g., in Hilbert’s consistency program. Similar efforts continue, but have been (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Theory of Computation
  1. The Explanation for a Quantum Circuit.Ilexa Yardley - 2024 - Https://Medium.Com/the-Circular-Theory.
    It is impossible to have a noun without a verb (an entity without a process) (the arithmetic number ‘one’ without the arithmetic number ‘two’). This is why and how humans are amiss, currently, about ‘quantum’ circuits… (the entity and process humans identify as 'mind').
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
The Church-Turing Thesis
  1. The open texture of ‘algorithm’ in legal language.Davide Baldini & Matteo De Benedetto - forthcoming - AI and Society.
    In this paper, we will survey the different uses of the term algorithm in contemporary legal practice. We will argue that the concept of algorithm currently exhibits a substantial degree of open texture, co-determined by the open texture of the concept of algorithm itself and by the open texture inherent to legal discourse. We will substantiate our argument by virtue of a case study, in which we analyze a recent jurisprudential case where the first and second-degree judges have carved-out contrasting (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
Computability
  1. Generalitation of the function N in Computational Analysis (12th edition).Rosanna Festa - 2024 - International Journal of Science, Engeneering and Technology 12 (2):1-4.
    The parallel research is contemporary to analyse processes and localisation in artificial intelligence (AI) associated with connexionism and learning algorithms. In machine learning, the perceptron (or McCulloch-Pitts neuron) is an algorithm for Boolean functions of binary classifiers. A binary classifier is a function which can decide whether or not an input, represented by a vector of numbers, belongs to some specific class. With a pattern N we use the calculator in synthesis applying polynomial advanced systems.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. Computability Theory.Valentina Harizanov, Keshav Srinivasan & Dario Verta - 2024 - In Bharath Sriraman (ed.), Handbook of the History and Philosophy of Mathematical Practice. Cham: Springer. pp. 1933-1961.
    Computability theory is the mathematical theory of algorithms, which explores the power and limitations of computation. Classical computability theory formalized the intuitive notion of an algorithm and provided a theoretical basis for digital computers. It also demonstrated the limitations of algorithms and showed that most sets of natural numbers and the problems they encode are not decidable (Turing computable). Important results of modern computability theory include the classification of the computational difficulty of sets and problems. Arithmetical and hyperarithmetical hierarchies and (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Computational Complexity
  1. What is a machine? Exploring the meaning of ‘artificial’ in ‘artificial intelligence’.Stefan Schulz & Janna Hastings - 2024 - Cosmos+Taxis 12 (5+6):37-41.
    Landgrebe and Smith provide an argument for the impossibility of Artificial General Intelligence based on the limits of simulating complex systems. However, their argument presupposes a very contemporary vision of artificial intelligence as a model trained on data to produce an algorithm executable in a modern digital computing system. The present contribution explores what it means to be artificial. Current artificial intelligence approaches on modern computing systems are not the only conceivable way in which artificial intelligence technology might be created. (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 88