Results for 'Computer network attacks'

1000+ found
Order:
  1.  11
    Attack scenario graphs for computer network threat analysis and prediction.Todd Hughes & Oleg Sheyner - 2003 - Complexity 9 (2):15-18.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Natural Computation Techniques Applications-Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.Ming Li & Huamin Feng - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4222--448.
    No categories
     
    Export citation  
     
    Bookmark  
  3.  69
    Logical Modes of Attack in Argumentation Networks.Dov M. Gabbay & Artur S. D’Avila Garcez - 2009 - Studia Logica 93 (2):199-230.
    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the metalevel to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  4.  14
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  10
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  20
    A Computational-Hermeneutic Approach for Conceptual Explicitation.Christoph Benzmüller & David Fuenmayor - 2019 - In Matthieu Fontaine, Cristina Barés-Gómez, Francisco Salguero-Lamillar, Lorenzo Magnani & Ángel Nepomuceno-Fernández (eds.), Model-Based Reasoning in Science and Technology: Inferential Models for Logic, Language, Cognition and Computation. Springer Verlag.
    We present a computer-supported approach for the logical analysis and conceptual explicitation of argumentative discourse. Computational hermeneutics harnesses recent progresses in automated reasoning for higher-order logics and aims at formalizing natural-language argumentative discourse using flexible combinations of expressive non-classical logics. In doing so, it allows us to render explicit the tacit conceptualizations implicit in argumentative discursive practices. Our approach operates on networks of structured arguments and is iterative and two-layered. At one layer we search for logically correct formalizations for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  15
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying (...) parameters during the attack. A model of an artificial immune system based on an evolutionary approach, an algorithm for genetic-competitive learning of the Kohonen network and a method of hierarchical hybridization of binary classifiers with the addition to the detection of anomalous network connections have been developed. The architecture of the network distributed attack detection system has been developed. The architecture of the attack detection system is two-tier: the first level provides the primary analysis of individual packets and network connections using signature analysis, the second level processes the processing of aggregate network data streams using adaptive classifiers. A signature analysis was performed to study network performance based on the Aho-Korasik and Boyer-Moore algorithms and their improved analogues were implemented using OpenMP and CUDA technologies. The architecture is presented and the main points of operation of the network attack generator are shown. A system for generating network attacks has been developed. This system consists of two components: an asynchronous transparent proxy server for TCP sessions and a frontend interface for a network attack generator. The results of the experiments confirmed that the functional and non-functional requirements, as well as the requirements for computing intelligent systems, are met for the developed attack detection system. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  11
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  23
    Computation and Causation.Richard Scheines - 2002 - Metaphilosophy 33 (1‐2):158-180.
    The computer’s effect on our understanding of causation has been enormous. By the mid‐1980s, philosophical and social‐scientific work on the topic had left us with (1) no reasonable reductive account of causation and (2) a class of statistical causal models tied to linear regression. At this time, computer scientists were attacking the problem of equipping robots with models of the external that included probabilistic portrayals of uncertainty. To solve the problem of efficiently storing such knowledge, they introduced Bayes (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  85
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  11.  50
    Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview.Dov M. Gabbay - 2009 - Studia Logica 93 (2-3):181-198.
    Given an argumentation network we associate with it a modal formula representing the 'logical content' of the network. We show a one-to-one correspondence between all possible complete Caminada labellings of the network and all possible models of the formula.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  12.  40
    Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview.Dov M. Gabbay - 2009 - Studia Logica 93 (2-3):357-381.
    In 2005 the author introduced networks which allow attacks on attacks of any level. So if a → b reads a attacks 6, then this attack can itself be attacked by another node c. This attack itself can attack another node d. This situation can be iterated to any level with attacks and nodes attacking other attacks and other nodes. In this paper we provide semantics to such networks. We offer three different approaches to obtaining (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  13.  39
    Equational approach to argumentation networks.D. M. Gabbay - 2012 - Argument and Computation 3 (2-3):87 - 142.
    This paper provides equational semantics for Dung's argumentation networks. The network nodes get numerical values in [0,1], and are supposed to satisfy certain equations. The solutions to these equations correspond to the ?extensions? of the network. This approach is very general and includes the Caminada labelling as a special case, as well as many other so-called network extensions, support systems, higher level attacks, Boolean networks, dependence on time, and much more. The equational approach has its conceptual (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  14. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15.  93
    Modal and temporal argumentation networks.H. Barringer, D. M. Gabbay & J. Woods - 2012 - Argument and Computation 3 (2-3):203 - 227.
    The traditional Dung networks depict arguments as atomic and study the relationships of attack between them. This can be generalised in two ways. One is to consider various forms of attack, support, feedback, etc. Another is to add content to nodes and put there not just atomic arguments but more structure, e.g. proofs in some logic or simply just formulas from a richer language. This paper offers to use temporal and modal language formulas to represent arguments in the nodes of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  16.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  11
    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez & Doris Esenarro Vargas - 2021 - Complexity 2021:1-13.
    As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. AISC 17 Talk: The Explanatory Problems of Deep Learning in Artificial Intelligence and Computational Cognitive Science: Two Possible Research Agendas.Antonio Lieto - 2018 - In Proceedings of AISC 2017.
    Endowing artificial systems with explanatory capacities about the reasons guiding their decisions, represents a crucial challenge and research objective in the current fields of Artificial Intelligence (AI) and Computational Cognitive Science [Langley et al., 2017]. Current mainstream AI systems, in fact, despite the enormous progresses reached in specific tasks, mostly fail to provide a transparent account of the reasons determining their behavior (both in cases of a successful or unsuccessful output). This is due to the fact that the classical problem (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  15
    Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability.Yuanyuan Ma & Lingxuan Li - 2018 - Complexity 2018:1-17.
    Bankruptcy of listed companies or shareholders delisting usually causes the crisis spreading in stock markets. Based on the systematic analysis of the epidemic diseases and rumors spreading on the complex networks, the SIR model is introduced to research the crisis spreading in shareholding networks of listed companies and their main holders on the basis of the data about ownership structure in Chinese Stock Markets. The characteristics of shareholding networks are studied, and the parameters for the SIR model are obtained by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  44
    Temporal, numerical and meta-level dynamics in argumentation networks.H. Barringer, D. M. Gabbay & J. Woods - 2012 - Argument and Computation 3 (2-3):143 - 202.
    This paper studies general numerical networks with support and attack. Our starting point is argumentation networks with the Caminada labelling of three values 1=in, 0=out and ½=undecided. This is generalised to arbitrary values in [01], which enables us to compare with other numerical networks such as predator?prey ecological networks, flow networks, logical modal networks and more. This new point of view allows us to see the place of argumentation networks in the overall landscape of networks and import and export ideas (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  21.  30
    Novel Node Centrality-Based Efficient Empirical Robustness Assessment for Directed Network.Xiaolong Deng, Hao Ding, Yong Chen, Cai Chen & Tiejun Lv - 2020 - Complexity 2020:1-14.
    In recent years, while extensive researches on various networks properties have been proposed and accomplished, little has been proposed and done on network robustness and node vulnerability assessment under cascades in directed large-scale online community networks. In essential, an online directed social network is a group-centered and information spread-dominated online platform which is very different from the traditional undirected social network. Some further research studies have indicated that the online social network has high robustness to random (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  8
    Towards a computational network theory of social groups.Daniel Redhead, Riana Minocher & Dominik Deffner - 2022 - Behavioral and Brain Sciences 45.
    Network theory is necessary for the realization of cognitive representations and resulting empirical observations of social groups. We propose that the triadic primitives denoting individual roles are multilayer, with positive and negative relations feeding into cost–benefit calculations. Through this, we advance a computational theory that generalizes to different scales and to contexts where conflict is not present.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. More broadly, computer networks have made interaction between.Cultures In Collision - 2002 - In James Moor & Terrell Ward Bynum (eds.), Cyberphilosophy: the intersection of philosophy and computing. Malden, MA: Blackwell.
  24.  17
    On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.Mohammad M. Masud, Mohamed Al Hemairy & Zouheir Trabelsi - 2015 - Journal of Intelligent Systems 24 (2):199-213.
    Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  10
    Research on the teaching innovation model of undergraduate musical ecology course under computer network environment.Bo Wang - 2022 - Educational Philosophy and Theory 54 (7):992-1002.
    Education ecology is a new crossover research field in network age. Its research content can be either microscopic classroom teaching or macro educational ecology research on teaching and culture. The university music classroom is a special kind of ecology. The reason why this is special is that compared to natural ecology, the classroom ecology of university music has a unique relationship between the environment and the subject. The classroom is ecological and becomes the logical prerequisite for ecological research in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  28
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28. Some Useful 16-Valued Logics: How a Computer Network Should Think.Yaroslav Shramko & Heinrich Wansing - 2005 - Journal of Philosophical Logic 34 (2):121-153.
    In Belnap's useful 4-valued logic, the set 2 = {T, F} of classical truth values is generalized to the set 4 = ������(2) = {Ø, {T}, {F}, {T, F}}. In the present paper, we argue in favor of extending this process to the set 16 = ᵍ (4) (and beyond). It turns out that this generalization is well-motivated and leads from the bilattice FOUR₂ with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN₃ with an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  29.  52
    How to Think About Cyber Conflicts Involving Non-state Actors.Phillip McReynolds - 2015 - Philosophy and Technology 28 (3):427-448.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions such actions, though illegal, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  53
    Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, rights (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  8
    The Information Web: Ethical and Social Implications of Computer Networking.Carol C. Gould (ed.) - 1989 - Routledge.
    This book deals with the major ethical and social implications of computer networking and its technological development. In this book, a number of leading thinkers--philosophers, computer scientists and researchers--address some fundamental questions posed by the new technology.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. [REVIEW]Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample & Shridat Sugrim - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Carol Gould, ed., The Information Web: Ethical and Social Implications of Computer Networking Reviewed by.Kristin Shrader-Frechette - 1990 - Philosophy in Review 10 (3):110-112.
     
    Export citation  
     
    Bookmark  
  34.  8
    Resilient and adaptive defense of computing networks.Robert Ghanea-Hercock - 2003 - Complexity 9 (2):13-14.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  6
    Emergent computation: Self-organizing, collective, and cooperative phenomena in natural and artificial computing networks.Peter M. Todd - 1993 - Artificial Intelligence 60 (1):171-183.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  35
    Computing Nature–A Network of Networks of Concurrent Information Processes.Gordana Dodig-Crnkovic & Raffaela Giovagnoli - 2013 - In Gordana Dodig-Crnkovic Raffaela Giovagnoli (ed.), Computing Nature. pp. 1--22.
    This text presents the research field of natural/unconventional computing as it appears in the book COMPUTING NATURE. The articles discussed consist a selection of works from the Symposium on Natural Computing at AISB-IACAP (British Society for the Study of Artificial Intelligence and the Simulation of Behaviour and The International Association for Computing and Philosophy) World Congress 2012, held at the University of Birmingham, celebrating Turing centenary. The COMPUTING NATURE is about nature considered as the totality of physical existence, the universe. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  37.  20
    The computational complexity of probabilistic inference using bayesian belief networks.Gregory F. Cooper - 1990 - Artificial Intelligence 42 (2-3):393-405.
  38.  13
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  31
    The Computational and Experimental Complexity of Gene Perturbations for Regulatory Network Search.David Danks, Clark Glymour & Peter Spirtes - 2003 - In W. H. Hsu, R. Joehanes & C. D. Page (eds.), Proceedings of IJCAI-2003 workshop on learning graphical models for computational genomics.
    Various algorithms have been proposed for learning (partial) genetic regulatory networks through systematic measurements of differential expression in wild type versus strains in which expression of specific genes has been suppressed or enhanced, as well as for determining the most informative next experiment in a sequence. While the behavior of these algorithms has been investigated for toy examples, the full computational complexity of the problem has not received sufficient attention. We show that finding the true regulatory network requires (in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  34
    A Network is a Network is a Network: Reflections on the Computational and the Societies of Control.David M. Berry & Alexander R. Galloway - 2016 - Theory, Culture and Society 33 (4):151-172.
    In this wide-ranging conversation, Berry and Galloway explore the implications of undertaking media theoretical work for critiquing the digital in a time when networks proliferate and, as Galloway claims, we need to ‘forget Deleuze’. Through the lens of Galloway’s new book, Laruelle: Against the Digital, the potential of a ‘non-philosophy’ for media is probed. From the import of the allegorical method from excommunication to the question of networks, they discuss Galloway’s recent work and reflect on the implications of computation for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  14
    Computation of the Complexity of Networks under Generalized Operations.Hafiz Usman Afzal, Muhammad Javaid, Ali Ovais & Md Nur Alam - 2022 - Complexity 2022:1-20.
    The connected and acyclic components contained in a network are identified by the computation of its complexity, where complexity of a network refers to the total number of spanning trees present within. The article in hand deals with the enumeration of the complexity of various networks’ operations such as sum, product, difference K 2, n ⊖ K 2, and the conjunction of S n with K 2. All our computations have been concluded by implementation of the methods of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Some Neural Networks Compute, Others Don't.Gualtiero Piccinini - 2008 - Neural Networks 21 (2-3):311-321.
    I address whether neural networks perform computations in the sense of computability theory and computer science. I explicate and defend
    the following theses. (1) Many neural networks compute—they perform computations. (2) Some neural networks compute in a classical way.
    Ordinary digital computers, which are very large networks of logic gates, belong in this class of neural networks. (3) Other neural networks
    compute in a non-classical way. (4) Yet other neural networks do not perform computations. Brains may well fall into this last class.
     
    Export citation  
     
    Bookmark   17 citations  
  43. Computational Intelligence Part II Lecture 1: Identification Using Neural Networks.Farzaneh Abdollahi - 2009 - In L. Magnani (ed.), Computational Intelligence.
  44.  70
    Moving beyond content‐specific computation in artificial neural networks.Nicholas Shea - 2021 - Mind and Language 38 (1):156-177.
    A basic deep neural network (DNN) is trained to exhibit a large set of input–output dispositions. While being a good model of the way humans perform some tasks automatically, without deliberative reasoning, more is needed to approach human‐like artificial intelligence. Analysing recent additions brings to light a distinction between two fundamentally different styles of computation: content‐specific and non‐content‐specific computation (as first defined here). For example, deep episodic RL networks draw on both. So does human conceptual reasoning. Combining the two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  13
    Diana Hook;, Jeremy Norman. Origins of Cyberspace: A Library on the History of Computing, Networking, and Telecommunications. x + 670 pp., illus., index. Novato, Calif.: Norman Publishing, 2002. $500. [REVIEW]Michael S. Mahoney - 2004 - Isis 95 (4):723-724.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  9
    Origins of Cyberspace: A Library on the History of Computing, Networking, and Telecommunications. [REVIEW]Michael Mahoney - 2004 - Isis 95:723-724.
  47.  27
    Enchanted Looms: Conscious Networks in Brains and Computers.Rodney Cotterill - 1998 - Cambridge University Press.
    The title of this book was inspired by a passage in Charles Sherrington's Man on his Nature.
    Direct download  
     
    Export citation  
     
    Bookmark   27 citations  
  48.  60
    On Computation of Entropy of Hex-Derived Network.Pingping Song, Haidar Ali, Muhammad Ahsan Binyamin, Bilal Ali & Jia-Bao Liu - 2021 - Complexity 2021:1-18.
    A graph’s entropy is a functional one, based on both the graph itself and the distribution of probability on its vertex set. In the theory of information, graph entropy has its origins. Hex-derived networks have a variety of important applications in medication store, hardware, and system administration. In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1 n and HDN 2 n, respectively of order n. We also compute some degree-based entropies such as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  16
    The Computational Challenges of Means Selection Problems: Network Structure of Goal Systems Predicts Human Performance.Daniel Reichman, Falk Lieder, David D. Bourgin, Nimrod Talmon & Thomas L. Griffiths - 2023 - Cognitive Science 47 (8):e13330.
    We study human performance in two classical NP‐hard optimization problems: Set Cover and Maximum Coverage. We suggest that Set Cover and Max Coverage are related to means selection problems that arise in human problem‐solving and in pursuing multiple goals: The relationship between goals and means is expressed as a bipartite graph where edges between means and goals indicate which means can be used to achieve which goals. While these problems are believed to be computationally intractable in general, they become more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  36
    Universal computation in fluid neural networks.Ricard V. Solé & Jordi Delgado - 1996 - Complexity 2 (2):49-56.
    Fluid neural networks can be used as a theoretical framework for a wide range of complex systems as social insects. In this article we show that collective logical gates can be built in such a way that complex computation can be possible by means of the interplay between local interactions and the collective creation of a global field. This is exemplified by a NOR gate. Some general implications for ant societies are outlined. ©.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000