Results for 'Computer-aided content analysis'

998 found
Order:
  1.  35
    A Computer-Aided Affective Content Analysis of Nanotechnology Newspaper Articles.Robert Davis - 2011 - NanoEthics 5 (3):319-334.
    This paper explores the application of an affective content analysis to a selection of nanotechnology news articles gathered from selected newspapers. Thematic content analyses dominate current efforts to mine large text collections of popular science media; the addition of an affective analysis element can yield useful information to supplement future content analysis efforts. Using Whissell’s Dictionary of Affect in Language , the analysis rates news articles gathered over a twenty-two year period for their (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  97
    The Meaning(s) of Trust. A Content Analysis on the Diverse Conceptualizations of Trust in Scholarly Research on Business Relationships.Sandro Castaldo, Katia Premazzi & Fabrizio Zerbini - 2010 - Journal of Business Ethics 96 (4):657 - 668.
    Scholarly research largely converges on the argument that trust is of paramount importance to drive economic agents toward mutually satisfactory, fair, and ethically compliant behaviors. There is, however, little agreement on the meaning of trust, whose conceptualizations differ with respect to actors, relationships, behaviors, and contexts. At present, we know much better what trust does than what trust is. In this article, we present an extensive review and analysis of the most prominent articles on trust in market relationships. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  3.  22
    The Meaning of Trust. A Content Analysis on the Diverse Conceptualizations of Trust in Scholarly Research on Business Relationships.Sandro Castaldo, Katia Premazzi & Fabrizio Zerbini - 2010 - Journal of Business Ethics 96 (4):657-668.
    Scholarly research largely converges on the argument that trust is of paramount importance to drive economic agents toward mutually satisfactory, fair, and ethically compliant behaviors. There is, however, little agreement on the meaning of trust, whose conceptualizations differ with respect to actors, relationships, behaviors, and contexts. At present, we know much better what trust does than what trust is. In this article, we present an extensive review and analysis of the most prominent articles on trust in market relationships. Using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  4.  49
    Computer experiments in harmonic analysis.Michael Barany - unknown
    It is conventionally understood that computers play a rather limited role in theoretical mathematics. While computation is indispensable in applied mathematics and the theory of computing and algorithms is rich and thriving, one does not, even today, expect to find computers in theoretical mathematics settings beyond the theory of computing. Where computers are used, by those studying combinatorics , algebra, number theory, or dynamical systems, the computer most often assumes the role of an automated and speedy theoretician, performing manipulations (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    Forward reasoning and dependency-directed backtracking in a system for computer-aided circuit analysis.Richard M. Stallman & Gerald J. Sussman - 1977 - Artificial Intelligence 9 (2):135-196.
  6.  24
    Computer-Aided Diagnosis of Liver Tumors Based on Multi-Image Texture Analysis of Contrast-Enhanced CT. Selection of the Most Appropriate Texture Features.Dorota Duda, Marek Krętowski & Johanne Bézy-Wendling - 2013 - Studies in Logic, Grammar and Rhetoric 35 (1):49-70.
    In this work, a system for the classification of liver dynamic contest- enhanced CT images is presented. The system simultaneously analyzes the images with the same slice location, corresponding to three typical acquisition moments. At first, the texture features are extracted separately for each acquisition mo- ment. Afterwards, they are united in one “multiphase” vector, characterizing a triplet of textures. The work focuses on finding the most appropriate features that characterize a multi-image texture. At the beginning, the features which are (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  11
    Shifting Forest Value Orientations in the United States, 1980-2001: A Computer Content Analysis.David N. Bengston, Trevor J. Webb & David P. Fan - 2004 - Environmental Values 13 (3):373-392.
    This paper examines three forest value orientations - clusters of interrelated values and basic beliefs about forests - that emerged from an analysis of the public discourse about forest planning, management, and policy in the United States. The value orientations include anthropocentric, biocentric, and moral/spiritual/aesthetic orientations toward forests. Computer coded content analysis was used to identify shifts in the relative importance of these value orientations over the period 1980 through 2001. The share of expressions of anthropocentric (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  7
    A Content Analysis of Studies on Assistive Technology in Education.Huseyin Bicen & Olasile Babatunde Adedoyin - 2022 - Postmodern Openings 13 (3):01-12.
    Technology advancement provide more effective and efficient ways for the people to perform individual and or collective roles and execution of responsibilities, and this has also resulted to tenacious upsurge in peoples' dependence on technology. As the right for people with disabilities increases, the need to cater for their educational right like every other learner brought about the quest to provide for AT that can best serve those special students. Application of AT can help students with one or more deficiencies, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  5
    A Content Analysis on Articles Using Twitter in Education.Huseyin Bicen & Rustam Haidov - 2021 - Postmodern Openings 12 (1Sup1):19-34.
    In the new era, it is almost impossible to imagine a modern person without the information and communication technologies that fill his life. These technologies permeate all areas of activity, and education is no exception. Despite the huge number of research papers distributed on Twitter integrated into the fields of Education, there is a deficiency and lack of content analysis research papers. Thus, the search was conducted on the three major databases such as Web of Science, Scopus and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  53
    Anthropomorphizing AlphaGo: a content analysis of the framing of Google DeepMind’s AlphaGo in the Chinese and American press.Nathaniel Ming Curran, Jingyi Sun & Joo-Wha Hong - 2020 - AI and Society 35 (3):727-735.
    This article conducts a mixed-method content analysis of Chinese and American news media coverage of Google DeepMind’s Go playing computer program, AlphaGo. Drawing on humanistic approaches to artificial intelligence, combined with an empirically rigorous content analysis, it examines the differences and overlap in coverage by the Chinese and American press in their accounts of AlphaGo, and its historic match with Korea’s Lee Sedol in March, 2016. The event was not only followed intensely in China, but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Vision and Image Processing (I)-Computer Aided Classification of Mammographic Tissue Using Independent Component Analysis and Support Vector Machines.Athanasios Koutras, Ioanna Christoyianni, George Georgoulas & Evangelos Dermatas - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 568-577.
     
    Export citation  
     
    Bookmark  
  12. Computer Vision II-Generic 3-D Modeling for Content Analysis of Court-Net Sports Sequences.Jungong Han, Dirk Farin & Peter Hn De With - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 279-288.
     
    Export citation  
     
    Bookmark  
  13.  15
    John Steven Geary, Formulaic Diction in the “Poema de Fernán González” and the “Mocedades de Rodrigo”: A Computer-Aided Analysis. Potomac, Md.: Studia Humanitatis; Madrid: José Porrúa Turanzas, 1980. Paper. Pp. xv, 180. [REVIEW]Serge Lusignan - 1983 - Speculum 58 (4):1116-1117.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  4
    Computational Analysis Problem of Aesthetic Content in Fine-Art Paintings.Ольга Алексеевна Журавлева, Наталья Борисовна Савхалова, Андрей Владимирович Комаров, Денис Алексеевич Жердев, Анна Ивановна Демина, Эккарт Михаэльсен, Артем Владимирович Никоноров & Александр Юрьевич Нестеров - 2022 - Russian Journal of Philosophical Sciences 65 (2):120-140.
    The article discusses the possibilities of the formal analysis of the fine-art painting composition on the basis of the classical definitions of beauty and computational aesthetics’ approaches of the second half of the 20th century he authors define the problem and consider solutions for the formalization of aesthetic perception in the context of aesthetic text, i.e., as part of the fine arts composition – a formal sequence of signs simply ordered in accordance with the syntactic rules’ system. The methodology (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  10
    The computational content of Nonstandard Analysis.Sam Sanders - unknown
    Kohlenbach's proof mining program deals with the extraction of effective information from typically ineffective proofs. Proof mining has its roots in Kreisel's pioneering work on the so-called unwinding of proofs. The proof mining of classical mathematics is rather restricted in scope due to the existence of sentences without computational content which are provable from the law of excluded middle and which involve only two quantifier alternations. By contrast, we show that the proof mining of classical Nonstandard Analysis has (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  41
    Ethical Codes in Sports Organizations: Classification Framework, Content Analysis, and the Influence of Content on Code Effectiveness.Els De Waegeneer, Jeroen Van De Sompele & Annick Willem - 2016 - Journal of Business Ethics 136 (3):587-598.
    Sports organizations face various ethical challenges. To tackle these, ethical codes are becoming increasingly popular instruments. However, a lot of questions remain concerning their effectiveness. There is a particular lack of knowledge when it comes to their form and content, and on the influence of these features on the effectiveness of these codes of ethics. Therefore, we developed a framework to analyze ethical codes and used this to assess codes of ethics in sports clubs from six disciplines. The form (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Chapter Two Exploring Political Online Forums in Saudi Arabia through Thematic Content Analysis Yeslam Al-Saggaf.Yeslam Al-Saggaf - 2007 - In Soraj Hongladarom (ed.), Computing and Philosophy in Asia. Cambridge Scholars Press. pp. 13.
     
    Export citation  
     
    Bookmark  
  18.  23
    A journey through computability, topology and analysis.Manlio Valenti - 2022 - Bulletin of Symbolic Logic 28 (2):266-267.
    This thesis is devoted to the exploration of the complexity of some mathematical problems using the framework of computable analysis and descriptive set theory. We will especially focus on Weihrauch reducibility as a means to compare the uniform computational strength of problems. After a short introduction of the relevant background notions, we investigate the uniform computational content of problems arising from theorems that lie at the higher levels of the reverse mathematics hierarchy.We first analyze the strength of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  59
    Ethical Codes in Sports Organizations: Classification Framework, Content Analysis, and the Influence of Content on Code Effectiveness.Annick Willem, Jeroen Sompele & Els Waegeneer - 2016 - Journal of Business Ethics 136 (3):587-598.
    Sports organizations face various ethical challenges. To tackle these, ethical codes are becoming increasingly popular instruments. However, a lot of questions remain concerning their effectiveness. There is a particular lack of knowledge when it comes to their form and content, and on the influence of these features on the effectiveness of these codes of ethics. Therefore, we developed a framework to analyze ethical codes and used this to assess codes of ethics in sports clubs from six disciplines. The form (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Contents, vehicles, and complex data analysis in neuroscience.Daniel C. Burnston - 2020 - Synthese 199 (1-2):1617-1639.
    The notion of representation in neuroscience has largely been predicated on localizing the components of computational processes that explain cognitive function. On this view, which I call “algorithmic homuncularism,” individual, spatially and temporally distinct parts of the brain serve as vehicles for distinct contents, and the causal relationships between them implement the transformations specified by an algorithm. This view has a widespread influence in philosophy and cognitive neuroscience, and has recently been ably articulated and defended by Shea. Still, I am (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Content, computation, and individualism in vision theory.Keith Butler - 1996 - Analysis 56 (3):146-54.
  22. Qualitative Analysis of Content by.Yan Zhang & Barbara M. Wildemuth - 2005 - Human Brain Mapping 30 (7):2197-2206.
    The article describes an approach of systematic, rule guided qualitative text analysis, which tries to preserve some methodological strengths of quantitative content analysis and widen them to a concept of qualitative procedure. First the development of content analysis is delineated and the basic principles are explained (units of analysis, step models, working with categories, validity and reliability). Then the central procedures of qualitative content analysis, inductive development of categories and deductive application of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  10
    Segmental Analysis Abilities Constitute a Powerful Accelerator of Reading Acquisition.Alain Content - 1991 - Mind and Language 6 (2):113-121.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  19
    Nurses’ values on medical aid in dying: A qualitative analysis.Judy E. Davidson, Liz Stokes, Marcia S. DeWolf Bosek, Martha Turner, Genesis Bojorquez, Youn-Shin Lee & Michele Upvall - 2022 - Nursing Ethics 29 (3):636-650.
    Aim: Explore nurses’ values and perceptions regarding the practice of medical aid in dying. Background: Medical aid in dying is becoming increasing legal in the United States. The laws and American Nurses Association documents limit nursing involvement in this practice. Nurses’ values regarding this controversial topic are poorly understood. Methodology: Cross-sectional electronic survey design sent to nurse members of the American Nurses Association. Inductive thematic content analysis was applied to open-ended comments. Ethical Considerations: Approved by the institutional review (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  22
    Computer-assisted Analysis of Zhu Fonian’s Original Mahayana Sutras.Lin Qian & Michael Radich - 2021 - Buddhist Studies Review 38 (2).
    In her 2010 study of the Shi zhu duan jie jing T309, Jan Nattier found that several passages in T309 were copied from earlier Chinese Buddhist texts. She thus proposed that T309 is not a translation from an Indian text, but a “forgery” by Zhu Fonian. Extending Nattier’s analysis with the help of TACL, a tool for computational textual analysis, we conducted a more thorough analysis of Zhu Fonian’s four Mahayana texts, namely, T309, the Pusa chu tai (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  22
    On the Uniform Computational Content of the Baire Category Theorem.Vasco Brattka, Matthew Hendtlass & Alexander P. Kreuzer - 2018 - Notre Dame Journal of Formal Logic 59 (4):605-636.
    We study the uniform computational content of different versions of the Baire category theorem in the Weihrauch lattice. The Baire category theorem can be seen as a pigeonhole principle that states that a complete metric space cannot be decomposed into countably many nowhere dense pieces. The Baire category theorem is an illuminating example of a theorem that can be used to demonstrate that one classical theorem can have several different computational interpretations. For one, we distinguish two different logical versions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27. On the computational content of the axiom of choice.Stefano Berardi, Marc Bezem & Thierry Coquand - 1998 - Journal of Symbolic Logic 63 (2):600-622.
    We present a possible computational content of the negative translation of classical analysis with the Axiom of (countable) Choice. Interestingly, this interpretation uses a refinement of the realizability semantics of the absurdity proposition, which is not interpreted as the empty type here. We also show how to compute witnesses from proofs in classical analysis of ∃-statements and how to extract algorithms from proofs of ∀∃-statements. Our interpretation seems computationally more direct than the one based on Godel's Dialectica (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  28.  32
    Content, computation, and individualism in vision theory.K. Butler - 1996 - Analysis 56 (3):146-154.
  29.  20
    On the computational content of the Bolzano-Weierstraß Principle.Pavol Safarik & Ulrich Kohlenbach - 2010 - Mathematical Logic Quarterly 56 (5):508-532.
    We will apply the methods developed in the field of ‘proof mining’ to the Bolzano-Weierstraß theorem BW and calibrate the computational contribution of using this theorem in proofs of combinatorial statements. We provide an explicit solution of the Gödel functional interpretation as well as the monotone functional interpretation of BW for the product space Πi ∈ℕ[–ki, ki] . This results in optimal program and bound extraction theorems for proofs based on fixed instances of BW, i.e. for BW applied to fixed (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  30.  90
    Effective choice and boundedness principles in computable analysis.Vasco Brattka & Guido Gherardi - 2011 - Bulletin of Symbolic Logic 17 (1):73-117.
    In this paper we study a new approach to classify mathematical theorems according to their computational content. Basically, we are asking the question which theorems can be continuously or computably transferred into each other? For this purpose theorems are considered via their realizers which are operations with certain input and output data. The technical tool to express continuous or computable relations between such operations is Weihrauch reducibility and the partially ordered degree structure induced by it. We have identified certain (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  31. Fodor's new theory of content and computation.Andrew Brook & Robert J. Stainton - 1997 - Mind and Language 12 (3-4):459-74.
    In his recent book, The Elm and the Expert, Fodor attempts to reconcile the computational model of human cognition with information‐theoretic semantics, the view that semantic, and mental, content consists of nothing more than causal or nomic relationships, between words and the world, or (roughly) brain states and the world. In this paper, we do not challenge the project. Nor do we show that Fodor has failed to carry it out. instead, we urge that his analysis, when made (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  68
    Perspectives on computing ethics: a multi-stakeholder analysis.Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony & Dympna O’Sullivan - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):72-90.
    Purpose Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  11
    The impact of graphic motor programs and detailed visual analysis on letter-like shape recognition.Lola Seyll, Florent Wyckmans & Alain Content - 2020 - Cognition 205:104443.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  13
    Burks Arthur W., Warren Don W., and Wrights Jesse B.. An analysis of a logical machine using parenthesis-free notation. Mathematical tables and other aids to computation, vol. 8 , pp. 53–57. [REVIEW]Raymond J. Nelson - 1955 - Journal of Symbolic Logic 20 (1):70-71.
  35.  31
    Fodor's New Theory of Content and Computation.Andrew Brook & Robert J. Stainton - 1997 - Mind and Language 12 (3-4):459-474.
    In his recent book, The Elm and the Expert, Fodor attempts to reconcile the computational model of human cognition with information‐theoretic semantics, the view that semantic, and mental, content consists of nothing more than causal or nomic relationships, between words and the world, or (roughly) brain states and the world. In this paper, we do not challenge the project. Nor do we show that Fodor has failed to carry it out. instead, we urge that his analysis, when made (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  24
    Astrology, Computers, and the Volksgeist.Denis Dutton - 1995 - Philosophy and Literature 19 (2):424-434.
    In lieu of an abstract, here is a brief excerpt of the content:Astrology, Computers, and the VolksgeistDenis DuttonCarroll Righter is not a name you will recognize, unless, perhaps, you’re old enough and you grew up reading the Los Angeles Times. Righter was the Times’s astrologer, and encountering his name recently brought back a couple of memories from the early 1950s. I remember finding it strange that a man (he was pictured alongside his column) was called Carroll, though he didn’t (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  37.  39
    The Global Language of Human Rights: A Computational Linguistic Analysis.David S. Law - 2018 - The Law and Ethics of Human Rights 12 (1):111-150.
    Human rights discourse has been likened to a global lingua franca, and in more ways than one, the analogy seems apt. Human rights discourse is a language that is used by all yet belongs uniquely to no particular place. It crosses not only the borders between nation-states, but also the divide between national law and international law: it appears in national constitutions and international treaties alike. But is it possible to conceive of human rights as a global language or lingua (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  11
    Letter-Like Shape Recognition in Preschool Children: Does Graphomotor Knowledge Contribute?Lola Seyll & Alain Content - 2022 - Frontiers in Psychology 12.
    Based on evidence that learning new characters through handwriting leads to better recognition than learning through typing, some authors proposed that the graphic motor plans acquired through handwriting contribute to recognition. More recently two alternative explanations have been put forward. First, the advantage of handwriting could be due to the perceptual variability that it provides during learning. Second, a recent study suggests that detailed visual analysis might be the source of the advantage of handwriting over typing. Indeed, in that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  20
    Proofs and computations.Helmut Schwichtenberg - 2012 - New York: Cambridge University Press. Edited by S. S. Wainer.
    Driven by the question, 'What is the computational content of a (formal) proof?', this book studies fundamental interactions between proof theory and computability. It provides a unique self-contained text for advanced students and researchers in mathematical logic and computer science. Part I covers basic proof theory, computability and Gödel's theorems. Part II studies and classifies provable recursion in classical systems, from fragments of Peano arithmetic up to Π11-CA0. Ordinal analysis and the (Schwichtenberg-Wainer) subrecursive hierarchies play a central (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  6
    Astrology, Computers, and the Volksgeist.Denis Dutton - 1995 - Philosophy and Literature 19 (2):424-434.
    In lieu of an abstract, here is a brief excerpt of the content:Astrology, Computers, and the VolksgeistDenis DuttonCarroll Righter is not a name you will recognize, unless, perhaps, you’re old enough and you grew up reading the Los Angeles Times. Righter was the Times’s astrologer, and encountering his name recently brought back a couple of memories from the early 1950s. I remember finding it strange that a man (he was pictured alongside his column) was called Carroll, though he didn’t (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  9
    Toward a computational hermeneutics.Ronald L. Breiger, Robin Wagner-Pacifici & John W. Mohr - 2015 - Big Data and Society 2 (2).
    We describe some of the ways that the field of content analysis is being transformed in an Era of Big Data. We argue that content analysis, from its beginning, has been concerned with extracting the main meanings of a text and mapping those meanings onto the space of a textual corpus. In contrast, we suggest that the emergence of new styles of text mining tools is creating an opportunity to develop a different kind of content (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  42.  3
    Astrology, Computers, and the Volksgeist.David Novitz - 1995 - Philosophy and Literature 19 (2):424-434.
    In lieu of an abstract, here is a brief excerpt of the content:Astrology, Computers, and the VolksgeistDenis DuttonCarroll Righter is not a name you will recognize, unless, perhaps, you’re old enough and you grew up reading the Los Angeles Times. Righter was the Times’s astrologer, and encountering his name recently brought back a couple of memories from the early 1950s. I remember finding it strange that a man (he was pictured alongside his column) was called Carroll, though he didn’t (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43. Computability and recursion.Robert I. Soare - 1996 - Bulletin of Symbolic Logic 2 (3):284-321.
    We consider the informal concept of "computability" or "effective calculability" and two of the formalisms commonly used to define it, "(Turing) computability" and "(general) recursiveness". We consider their origin, exact technical definition, concepts, history, general English meanings, how they became fixed in their present roles, how they were first and are now used, their impact on nonspecialists, how their use will affect the future content of the subject of computability theory, and its connection to other related areas. After a (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   51 citations  
  44. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  45.  8
    Does China’s Aid in Africa Affect Traditional Donors?Kassaye Deyassa - 2019 - International Studies. Interdisciplinary Political and Cultural Journal 23 (1):199-215.
    China’s role as an emerging aid provider and the concept of a social plan in Africa has led to polarised responses in the West. Several say that this “productivist” strategy is much less determined by the concepts of citizenship, legal, social rights, and much more regarding building functions. The purpose of this study is to examine whether the welfare and social policy ideas that characterize Chinese aid in Africa are influencing traditional donors and becoming global. The article utilised a qualitative (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  6
    Assessment of Agreement Between a New Application to Compute the Wisconsin Gait Score and 3-Dimensional Gait Analysis, and Reliability of the Application in Stroke Patients.Agnieszka Guzik, Andżelina Wolan-Nieroda & Mariusz Drużbicki - 2022 - Frontiers in Human Neuroscience 16.
    Currently, there are no computerized tools enabling objective interpretation of observational gait assessment based on Wisconsin Gait Scale, which is a reliable and well-tested tool. The solution envisaged by us may provide a practical tool for assessing gait deviations in patients with hemiparesis after stroke. The present study assessed agreement between a new application software for computerized WGS and 3-dimensional gait analysis, and reliability of the application. The study involved 33 individuals with hemiparesis after stroke. The software was developed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of data and this (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. An analysis of information visualisation.Min Chen & Luciano Floridi - 2013 - Synthese 190 (16):3421-3438.
    Philosophers have relied on visual metaphors to analyse ideas and explain their theories at least since Plato. Descartes is famous for his system of axes, and Wittgenstein for his first design of truth table diagrams. Today, visualisation is a form of ‘computer-aided seeing’ information in data. Hence, information is the fundamental ‘currency’ exchanged through a visualisation pipeline. In this article, we examine the types of information that may occur at different stages of a general visualization pipeline. We do (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49.  32
    Logic and Computer Design Fundamentals.M. Morris Mano, Charles R. Kime & Tom Martin - 2000 - Prentice-Hall.
    "Offering integrated coverage of both digital and computer design, this text offers well-organized, concise, yet comprehensive content, presented from a contemporary engineering viewpoint. Understanding of the material is supported by clear explanations and a progressive development of examples ranging from sample combinatorial applications to a CISC architecture built upon a RISC core. A thorough coverage of traditional topics is combined with increased attention to computer-aided design, problem formulation, solution verification, and the building of problem-solving skills."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  3
    John Hadji Argyris (1913–2004) and the Computational Structural Analysis in the British Aircraft Engineering in the Mid-20th Century. [REVIEW]Nicolino Foschini Neto - 2020 - Circumscribere: International Journal for the History of Science 25:60.
    This work deals with the context of formation of Professor Dr. John Hadji Argyris in Germany during the 1930s and Switzerland during the 1940s. Using primary documentation, we elucidate publications with scientific theories of structural analysis made during his job as a member of a secret Commission in the Royal Aeronautical Society, in England. We explore the content of the serial publication of the Theorems of Energy and Structural Analysis of the Aircraft Engineering Journal, from 1954 and (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 998