Results for ' Ieee'

160 found
Order:
  1.  28
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  2.  51
    IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model.Stephen Bush, Goel F., Simard Sanjay & Georges - forthcoming - Philosophical Explorations.
    IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model, directly overlays events in the power grid with communication performance on the same spacetime model, it ensures a perspective that verifies that any of the myriad of communication technologies chosen will provide the required support for the Smart Grid. For Corporate or Institutional Access, request a custom quote for your organization at www.ieee.org/smartgridresearch.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3. IEEE Vision for Smart Grid Communications: 2030 and Beyond Roadmap.Stephen Bush, Goel F., Simard Sanjay & Georges - forthcoming - Standard-Download.Org.
    This IEEE Vision for Smart Grid Communications: 2030 and Beyond Roadmap is a high-levelsupplement of the full vision document IEEE Vision for Smart Grid Communications: 2030 andBeyond. Communication is a major enabling technology for the Smart Grid. We believe that the powergrid will tend to utilize advances in communications since the data exchange requirements willscale up for the Smart Grid. Smart Grid communication will help to improve demand forecasting,enable self-healing from power disturbance events, facilitate active participation by consumers (...)
     
    Export citation  
     
    Bookmark  
  4. 13th IEEE International Conference on Cognitive Informatics and Cognitive Computing, (ICCI*CC’14) at LSBU, London, UK.S. Patel, Y. Wang, W. Kinsner, D. Patel, G. Fariello & L. A. Zadeh (eds.) - 2014 - IEEE Computer Society Press.
  5. Ieee vision for Smart grid communications: 2030 and beyond.Sanjay Goel, Stephen Bush, Bakken F. & David - forthcoming - Standard-Download.Org.
    This document provides a vision of the communications-related aspects of the Smart Grid in the year 2030, and lays out the technology roadmap that will lead us to the vision. This document starts with some basic knowledge of the power grid and follows up with fundamental building blocks for the communication infrastructure that will accompany the Smart Grid. Subsequently, network architectures, including overlays, are discussed at length. Also discussed, are important issues such as standards, regulations, security, and disruptive technologies. The (...)
     
    Export citation  
     
    Bookmark  
  6.  9
    IEEE-SSIT Distinguished Service Award.R. A. Cyberethics - 1985 - Metaphilosophy 16 (4).
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. IEEE SpringSim Proceedings 2019.A. Del Barrio, C. J. Lynch, F. J. Barros & X. Hu (eds.) - 2019 - IEEE.
    No categories
     
    Export citation  
     
    Bookmark  
  8. 2019 IEEE International Symposium on Technology and Society (ISTAS).Ning Wang (ed.) - 2019
    No categories
     
    Export citation  
     
    Bookmark  
  9. 2020 IEEE International Symposium on Circuits and Systems (ISCAS).Hao Zhan, Dan Wan & Zhiwei Huang (eds.) - 2020 - Seville, Spain: IEEE.
  10. 18th IEEE International Conference on Image Processing.Charles R. Twardy (ed.) - 2011 - IEEE.
    No categories
     
    Export citation  
     
    Bookmark  
  11. IEEE Fourth Symposium on Bioinformatics and Bioengineering, Taichung, Taiwan.Kumar Anand & Smith Barry - 2004 - IEEE Press.
     
    Export citation  
     
    Bookmark  
  12. IEEE International Conference on Bioinformatics and Biomedicine (IEEE BIBM 2015).Huang Jingshan, Eilbeck Karen, A. Blake Judith, Dou Dejing, A. Natale Darren, Ruttenberg Alan, Smith Barry, T. Zimmermann Michael, Jiang Guoqian & Lin Yu (eds.) - 2015
     
    Export citation  
     
    Bookmark  
  13. IEEE International Conference on Bioinformatics and Biomedicine (IEEE BIBM 2015),.Jingshan Huang, Fernando Gutierrez, Dejing Dou, Judith A. Blake, Karen Eilbeck, Darren A. Natale, Barry Smith, Yu Lin, Xiaowei Wang & Zixing Liu (eds.) - 2015
     
    Export citation  
     
    Bookmark  
  14. Proceedings of the 2020 IEEE International Symposium on Technology in Society (ISTAS).Ning Wang (ed.) - 2021
    No categories
     
    Export citation  
     
    Bookmark  
  15.  27
    Baseband processor for IEEE 802.11 a standard with embedded BIST.Milos Krstic, Koushik Maharatna, Alfonso Troya, Eckhard Grass & Ulrich Jagdhold - 2004 - Facta Universitatis, Series: Linguistics and Literature 17:231-239.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  36
    Adaptive Traffic-Aware PSM Mechanism for IEEE 802.11 WLANs.Xijian Chen, Pengfei Yuan, Xilong Sun & Yi Xie - 2014 - Journal of Intelligent Systems 23 (4):437-450.
    Wireless devices consume large amounts of energy during wireless communication. As the energy storage of battery is limited, improving energy efficiency has become an important approach to prolong the lifetime of devices. The IEEE 802.11 protocol supports the power save mode in wireless local area networks. However, the standard PSM cannot adapt to the changes of traffic load or channel conditions. Therefore, this article proposes an adaptive traffic-aware PSM mechanism that improves energy efficiency of wireless devices in a WLAN (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  19
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  22
    C. S. Lorens. Invertible Boolean functions. IEEE transactions on electronic computers, vol. EC–13 , pp. 529–541.Harold S. Stone - 1971 - Journal of Symbolic Logic 36 (2):347-348.
  19. Companion of the 2021 ACM/IEEE International Conference on Human-Robot Interaction (HRI’21 Companion).Markus Kneer & Michael T. Stuart (eds.) - 2021 - New York, NY, USA:
    No categories
     
    Export citation  
     
    Bookmark  
  20. Link quality based association mechanism in IEEE 802.11 h compliant wireless LANs.Thanasis Korakis, O. Ercetin, S. Krishnamurthy, Leandros Tassiulas & Satish Tripathi - 2005 - In Alan F. Blackwell & David MacKay (eds.), Power. Cambridge University Press. pp. 5.
     
    Export citation  
     
    Bookmark  
  21.  15
    Karl S. Menger. Characterization and cardinality of universal functions. IEEE transactions on electronic computers, vol. EC-14 , pp. 720–721. [REVIEW]Edgar N. Gilbert - 1971 - Journal of Symbolic Logic 36 (3):548-549.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22.  9
    Tison Pierre. Generalization of consensus theory and application to the minimization of Boolean functions. IEEE transactions on electronic computers, vol. EC-16 , pp. 446–456. [REVIEW]James F. Gimpel - 1968 - Journal of Symbolic Logic 33 (3):468-468.
  23.  42
    Choudhury A. K. and Basu M. S.. On detection of group invariance or total symmetry of a Boolean function. Indian journal of physics, vol. 36 , pp. 31–42; also Proceedings of the Indian Association for the Cultivation of Science, vol. 45 , pp. 31–42.Sheng C. L.. Detection of totally symmetric Boolean functions. IEEE transactions on electronic computers, vol. EC-14 , pp. 924–926.Choudhury A. K. and Das S. R.. Comment on “Detection of totally symmetric Boolean functions.” IEEE transactions on electronic computers, vol. EC-15 , p. 813.Sheno C. L.. Author's reply. IEEE transactions on electronic computers, vol. EC-15 , p. 813. [REVIEW]M. A. Harrison - 1971 - Journal of Symbolic Logic 36 (4):694-695.
  24.  19
    Kudielka V. and Oliva P.. Complete sets of functions of two and three binary variables. IEEE transactions on electronic computers, vol. EC-15 , pp. 930–931. [REVIEW]William Wernick - 1972 - Journal of Symbolic Logic 37 (2):417-417.
  25. KM99] GP Kogan and JA Makowsky. Computing Schur functions for Borchardt matrices. in preparation, 1999. Kog96] GP Kogan. Computing the permanent over elds of characteristic 3: Where and why it becomes dificult. In FOCS'96, pages 108 {114. IEEE, 1996. [REVIEW]S. Abramsky, D. Gabbay & T. Maibaum - 1996 - Annals of Pure and Applied Logic 78 (2):189-202.
  26.  40
    H. H. LoomsJr., and R. H. WymanJr., On complete sets of logic primitives. IEEE transactions on electronic computers, vol. EC-14 , pp. 173–174. [REVIEW]H. B. Enderton - 1970 - Journal of Symbolic Logic 35 (1):160.
  27.  37
    Lin Shen and Rado Tibor. Computer studies of Turing machine problems. Journal of the Association for Computing Machinery, vol. 12 , pp. 196–212.Brady Allen H.. The conjectured highest scoring machines for Rado's Σ for the value k = 4. IEEE transactions on electronic computers, vol. EC-15 , pp. 802–803.Green Milton W.. A lower bound on Rado's sigma function for binary Turing machines. Switching circuit theory and logical design, Proceedings of the Fifth Annual Symposium, Princeton University, Princeton, N.J., November 11-13, 1964, The Institute of Electrical and Electronics Engineers, Inc., New York 1964, pp. 91–94. [REVIEW]H. B. Enderton - 1975 - Journal of Symbolic Logic 40 (4):617-617.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. The papers in this Special Issue were invited from papers presented at the 1992 IEEE Symposium on Logic in Computer Science. All of the invited papers have been refereed in the usual manner; in most cases, they are substantially revised and expanded. I thank the authors and the referees for their effort. [REVIEW]Andre Scedrov - 1994 - Annals of Pure and Applied Logic 69:133.
  29.  13
    Meo Angelo R.. On the determination of the ps maximal implicants of a switching function. IEEE transactions on electronic computers, vol. EC-14 , pp. 830–840. [REVIEW]A. K. Choudhury - 1968 - Journal of Symbolic Logic 33 (2):303-303.
  30.  33
    Michael A. Harrison. The number of transitivity sets of Boolean functions. Journal of the Society for Industrial and Applied Mathematics, t. 11 , p. 806–828. - Michael A. Harrison. The number of equivalence classes of Boolean functions under groups containing negation. IEEE transactions on electronic computers, t. EC-12 , p. 559–561. - Michael A. Harrison. On the number of classes of switching networks. Journal of the Franklin Institute, t. 276 , p. 313–327. - Michael A. Harrison. The number of classes of invertible Boolean functions. Journal of the Association for Computing Machinery, t. 10 , p. 25–28. [REVIEW]J. Kuntzmann - 1970 - Journal of Symbolic Logic 35 (1):160-161.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  21
    Peter S. Landweber. Decision problems of phrase-structure grammars. IEEE transactions on electronic computers, vol. EC-13 , pp. 354–362. [REVIEW]S. -Y. Kuroda - 1967 - Journal of Symbolic Logic 32 (1):115.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Examples of real world engineering ethics problems.Stephen H. Unger - 2000 - Science and Engineering Ethics 6 (3):423-430.
    Nine examples are presented illustrating the kinds of problems encountered in actual practice by conscientious engineers. These cases are drawn fom the records of the IEEE Ethics Committee, and from the experience of the ethics help-line initiated recently by the Online Ethics Center for Engineering and Science. They range from situations in which companies try to cheat one another to those in which human health and safety are jeopardized. In one case, an engineer learned that even a quiet resignation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Responsible AI: Two Frameworks for Ethical Design and Practice.Dorian Peters, Karina Vold, Diana Robinson & Rafael Calvo - 2020 - IEEE Transactions on Technology and Society 1 (1).
    In 2019, the IEEE launched the P7000 standards projects intended to address ethical issues in the design of autonomous and intelligent systems. This move came amidst a growing public concern over the unintended consequences of artificial intelligence (AI), compounded by the lack of an anticipatory process for attending to ethical impact within professional practice. However, the difficulty in moving from principles to practice presents a significant challenge to the implementation of ethical guidelines. Herein, we describe two complementary frameworks for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  34. Embedding Values in Artificial Intelligence (AI) Systems.Ibo van de Poel - 2020 - Minds and Machines 30 (3):385-409.
    Organizations such as the EU High-Level Expert Group on AI and the IEEE have recently formulated ethical principles and (moral) values that should be adhered to in the design and deployment of artificial intelligence (AI). These include respect for autonomy, non-maleficence, fairness, transparency, explainability, and accountability. But how can we ensure and verify that an AI system actually respects these values? To help answer this question, I propose an account for determining when an AI system can be said to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   40 citations  
  35. Injusticias Epistémicas: Análisis y Contextos.Cristián Santibáñez & Leandro De Brasi (eds.) - 2022 - Lima, Peru: Palestra Editores.
    Injusticia epistémica es una etiqueta conceptual que ha tenido, al menos, un doble rendimiento. Por una parte, el concepto que ha propuesto Miranda Fricker en Injusticia Epistémica ha permitido profundizar en el diálogo filosófico respecto de cómo se generan y justifican las creencias y las pretensiones de conocimiento y, por otra parte, ha permitido en el dominio social nombrar distintas prácticas culturales de abuso, invisibilización, o asimetrías de poder que benefician algunos y deterioran a otros. Ya han pasado quince años (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  91
    On the person-based predictive policing of AI.Tzu-Wei Hung & Chun-Ping Yen - 2020 - Ethics and Information Technology 23 (3):165-176.
    Should you be targeted by police for a crime that AI predicts you will commit? In this paper, we analyse when, and to what extent, the person-based predictive policing (PP) — using AI technology to identify and handle individuals who are likely to breach the law — could be justifiably employed. We first examine PP’s epistemological limits, and then argue that these defects by no means refrain from its usage; they are worse in humans. Next, based on major AI ethics (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37.  27
    Seeming autonomy, technology and the uncanny valley.Rasmus Gahrn-Andersen - 2022 - AI and Society 37 (2):595-603.
    This paper extends Mori’s (IEEE Robot Autom Mag 19:98–100, 2012) uncanny valley-hypothesis to include technologies that fail its basic criterion that uncanniness arises when the subject experiences a discrepancy in a machine’s human likeness. In so doing, the paper considers Mori’s hypothesis about the uncanny valley as an instance of what Heidegger calls the ‘challenging revealing’ nature of modern technology. It introduces seeming autonomy and heteronomy as phenomenological categories that ground human being-in-the-world including our experience of things and people. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  25
    Immersive Interactive Technologies for Positive Change: A Scoping Review and Design Considerations.Alexandra Kitson, Mirjana Prpa & Bernhard E. Riecke - 2018 - Frontiers in Psychology 9:370199.
    Practices such as mindfulness, introspection, and self-reflection are known to have positive short and long-term effects on health and well-being. However, in today’s modern, fast-paced, technological world tempted by distractions these practices are often hard to access and relate to a broader audience. Consequently, technologies have emerged that mediate personal experiences, which is reflected in the high number of available applications designed to elicit positive changes. These technologies elicit positive changes by bringing users’ attention to the self – from technologies (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  58
    Improved Butterfly Optimizer-Configured Extreme Learning Machine for Fault Diagnosis.Helong Yu, Kang Yuan, Wenshu Li, Nannan Zhao, Weibin Chen, Changcheng Huang, Huiling Chen & Mingjing Wang - 2021 - Complexity 2021:1-17.
    An efficient intelligent fault diagnosis model was proposed in this paper to timely and accurately offer a dependable basis for identifying the rolling bearing condition in the actual production application. The model is mainly based on an improved butterfly optimizer algorithm- optimized kernel extreme learning machine model. Firstly, the roller bearing’s vibration signals in the four states that contain normal state, outer race failure, inner race failure, and rolling ball failure are decomposed into several intrinsic mode functions using the complete (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  98
    The popular appeal of apocalyptic ai.Robert M. Geraci - 2010 - Zygon 45 (4):1003-1020.
    The belief that computers will soon become transcendently intelligent and that human beings will “upload” their minds into machines has become ubiquitous in public discussions of robotics and artificial intelligence in Western cultures. Such beliefs are the result of pervasive Judaeo-Christian apocalyptic beliefs, and they have rapidly spread through modern pop and technological culture, including such varied and influential sources as Rolling Stone, the IEEE Spectrum, and official United States government reports. They have gained sufficient credibility to enable the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  41.  19
    Ethics of Quantum Technologies: A Scoping Review.Steven Umbrello - 2023 - International Journal of Applied Philosophy 37 (2):179-205.
    The rapid development of quantum technologies, such as quantum computing, quantum internet, and quantum sensing, has led to a growing awareness of the ethical issues surrounding these technologies. This literature review aims to analyze the existing research on these ethical issues using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) literature review approach. The literature search was conducted using the following databases: Scopus ArXiv, and IEEE Xplore, and the search terms used were “quantum computing,” “quantum internet,” “quantum (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  18
    Desempeño en métodos de navegación autónoma para robots móviles.Gabriela Alvarez & Omar Flor - 2020 - Minerva 1 (2):19-29.
    En este trabajo se presenta una comparación de los tiempos de respuesta, optimización de la ruta y complejidad del grafo en métodos de planificación de trayectoria para robots móviles autónomos. Se contrastan los desarrollos de Voronoi, Campos potenciales, Roadmap probabilístico y Descomposición en celdas para la navegación en un mismo entorno y validándolos para un número variable de obstáculos. Las evaluaciones demuestran que el método de generación de trayectoria por Campos Potenciales, mejora la navegación respecto de la menor ruta obtenida, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  19
    Beyond the code of ethics: the responsibility of professional societies.Richard S. Rosenberg - 1998 - Acm Sigcas Computers and Society 28 (2):18-25.
    Drafting a code of ethics for a professional society is a daunting and exhausting task. Whereas the basic components of a professional code of ethics or professional standards are reasonably well understood, the specific details require careful tailoring to meet the needs of a given profession. The difficulty of this process probably explains why such codes are rarely updated. Furthermore, once having produced an updated ethics code, many professional organizations, or perhaps better the associated executive, feel that their work has (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  44. Ethical issues for robotics and autonomous systems.John McDermid, Vincent C. Müller, Tony Pipe, Zoe Porter & Alan Winfield - 2019 - UK Robotics and Autonomous Systems Network.
    There are unusual challenges in ethics for RAS. Perhaps the issue can best be summarised as needing to consider “technically informed ethics”. The technology of RAS raises issues that have an ethical dimension, and perhaps uniquely so due to the possibility of moving human decision-making which is implicitly ethically informed to computer systems. Further, if seeking solutions to these problems – ethically aligned design, to use the IEEE’s terminology – then the solutions must be technically meaningful, capable of realisation, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  11
    Tableaux for constructive concurrent dynamic logic.Duminda Wijesekera & Anil Nerode - 2005 - Annals of Pure and Applied Logic 135 (1-3):1-72.
    This is the first paper on constructive concurrent dynamic logic . For the first time, either for concurrent or sequential dynamic logic, we give a satisfactory treatment of what statements are forced to be true by partial information about the underlying computer. Dynamic logic was developed by Pratt [V. Pratt, Semantical considerations on Floyd–Hoare logic, in: 17th Annual IEEE Symp. on Found. Comp. Sci., New York, 1976, pp. 109–121, V. Pratt, Applications of modal logic to programming, Studia Logica 39 (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  27
    Optimal Dispatch of Reactive Power Using Modified Stochastic Fractal Search Algorithm.Thang Trung Nguyen, Dieu Ngoc Vo, Hai Van Tran & Le Van Dai - 2019 - Complexity 2019:1-28.
    This paper applies a proposed modified stochastic fractal search algorithm (MSFS) for dealing with all constraints of optimal reactive power dispatch (ORPD) and finding optimal solutions for three different cases including power loss optimization, voltage deviation optimization, and L-index optimization. The proposed MSFS method is newly constructed in the paper by modifying three new solution update mechanisms on standard stochastic fractal search algorithm (SSFS). The first modification is to keep only one formula and abandon one formula in the diffusion process (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  80
    Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems.Bashar Ahmad Khalaf, Salama A. Mostafa, Hayder H. Safi, Khalid Mohammed Saffer & Ihsan Salman - 2023 - Journal of Intelligent Systems 32 (1).
    The efficiency of distribution networks is hugely affected by active and reactive power flows in distribution electric power systems. Currently, distributed generators (DGs) of energy are extensively applied to minimize power loss and improve voltage deviancies on power distribution systems. The best position and volume of DGs produce better power outcomes. This work prepares a new hybrid SSA–GWO metaheuristic optimization algorithm that combines the salp swarm algorithm (SSA) and the gray wolf optimizer (GWO) algorithm. The SSA–GWO algorithm ensures generating the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  54
    Proceedings of the 4th World Conference on Research Integrity: Brazil, Rio de Janeiro. 31 May - 3 June 2015.Lex Bouter, Melissa S. Anderson, Ana Marusic, Sabine Kleinert, Susan Zimmerman, Paulo S. L. Beirão, Laura Beranzoli, Giuseppe Di Capua, Silvia Peppoloni, Maria Betânia de Freitas Marques, Adriana Sousa, Claudia Rech, Torunn Ellefsen, Adele Flakke Johannessen, Jacob Holen, Raymond Tait, Jillon Van der Wall, John Chibnall, James M. DuBois, Farida Lada, Jigisha Patel, Stephanie Harriman, Leila Posenato Garcia, Adriana Nascimento Sousa, Cláudia Maria Correia Borges Rech, Oliveira Patrocínio, Raphaela Dias Fernandes, Laressa Lima Amâncio, Anja Gillis, David Gallacher, David Malwitz, Tom Lavrijssen, Mariusz Lubomirski, Malini Dasgupta, Katie Speanburg, Elizabeth C. Moylan, Maria K. Kowalczuk, Nikolas Offenhauser, Markus Feufel, Niklas Keller, Volker Bähr, Diego Oliveira Guedes, Douglas Leonardo Gomes Filho, Vincent Larivière, Rodrigo Costas, Daniele Fanelli, Mark William Neff, Aline Carolina de Oliveira Machado Prata, Limbanazo Matandika, Sonia Maria Ramos de Vasconcelos & Karina de A. Rocha - 2016 - Research Integrity and Peer Review 1 (Suppl 1).
    Table of contentsI1 Proceedings of the 4th World Conference on Research IntegrityConcurrent Sessions:1. Countries' systems and policies to foster research integrityCS01.1 Second time around: Implementing and embedding a review of responsible conduct of research policy and practice in an Australian research-intensive universitySusan Patricia O'BrienCS01.2 Measures to promote research integrity in a university: the case of an Asian universityDanny Chan, Frederick Leung2. Examples of research integrity education programmes in different countriesCS02.1 Development of a state-run “cyber education program of research ethics” in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49. There is no 'I' in 'Robot': Robots and Utilitarianism (expanded & revised).Christopher Grau - 2011 - In Susan Anderson & Michael Anderson (eds.), Machine Ethics. Cambridge University Press. pp. 451.
    Utilizing the film I, Robot as a springboard, I here consider the feasibility of robot utilitarians, the moral responsibilities that come with the creation of ethical robots, and the possibility of distinct ethics for robot-robot interaction as opposed to robot-human interaction. (This is a revised and expanded version of an essay that originally appeared in IEEE: Intelligent Systems.).
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  50.  14
    A domain model characterising strong normalisation.Ulrich Berger - 2008 - Annals of Pure and Applied Logic 156 (1):39-50.
    Building on previous work by Coquand and Spiwack [T. Coquand, A. Spiwack, A proof of strong normalisation using domain theory, in: Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science, LICS’06, IEEE Computer Society Press, 2006, pp. 307–316] we construct a strict domain-theoretic model for the untyped λ-calculus with pattern matching and term rewriting which has the property that a term is strongly normalising if its value is not . There are no disjointness or confluence (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 160