Results for 'Lossy and insertion-error computations'

1000+ found
Order:
  1.  33
    The Decision Problem of Modal Product Logics with a Diagonal, and Faulty Counter Machines.C. Hampson, S. Kikot & A. Kurucz - 2016 - Studia Logica 104 (3):455-486.
    In the propositional modal treatment of two-variable first-order logic equality is modelled by a ‘diagonal’ constant, interpreted in square products of universal frames as the identity relation. Here we study the decision problem of products of two arbitrary modal logics equipped with such a diagonal. As the presence or absence of equality in two-variable first-order logic does not influence the complexity of its satisfiability problem, one might expect that adding a diagonal to product logics in general is similarly harmless. We (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  5
    Corrupting data and sensing error, or how to ‘see’ digital images.Magdalena Tyżlik-Carver - 2023 - Philosophy of Photography 14 (2):283-300.
    In response to calls to forget and unthink photography this article considers the computational environment and its consequences for the image making. What is there to know about images that are networked and generated with data processing techniques rather than with light and chemistry? How to analyse images and read what they are and what they represent, beyond what is visible in the picture? The article argues that glitches while aesthetically capturing errors in the machine point to broader conditions of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  11
    Sources of error and accountability in computer systems: Comments on “accountability in a computerized society”.Dr Peter Szolovits - 1996 - Science and Engineering Ethics 2 (1):43-46.
    Sources of error and accountability in computer systems: Comments on “accountability in a computerized society”.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. Thought insertion and immunity to error through misidentification.Annalisa Coliva - 2002 - Philosophy, Psychiatry, and Psychology 9 (1):27-34.
    John Campbell (1999) has recently maintained that the phenomenon of thought insertion as it is manifested in schizophrenic patients should be described as a case in which the subject is introspectively aware of a certain thought and yet she is wrong in identifying whose thought it is. Hence, according to Campbell, the phenomenon of thought insertion might be taken as a counterexample to the view that introspection-based mental selfascriptions are logically immune to error through misidentification (IEM, hereafter). (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  5.  10
    Omission and commission errors underlying AI failures.Sasanka Sekhar Chanda & Debarag Narayan Banerjee - forthcoming - AI and Society:1-24.
    In this article we investigate origins of several cases of failure of Artificial Intelligence (AI) systems employing machine learning and deep learning. We focus on omission and commission errors in (a) the inputs to the AI system, (b) the processing logic, and (c) the outputs from the AI system. Our framework yields a set of 28 factors that can be used for reconstructing the path of AI failures and for determining corrective action. Our research helps identify emerging themes of inquiry (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  10
    Modeling and Simulation of Athlete’s Error Motion Recognition Based on Computer Vision.Luo Dai - 2021 - Complexity 2021:1-10.
    Computer vision is widely used in manufacturing, sports, medical diagnosis, and other fields. In this article, a multifeature fusion error action expression method based on silhouette and optical flow information is proposed to overcome the shortcomings in the effectiveness of a single error action expression method based on the fusion of features for human body error action recognition. We analyse and discuss the human error action recognition method based on the idea of template matching to analyse (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  17
    A Promise of Happiness? Nietzsche on Beauty.Annamaria Lossi - 2022 - Nietzsche Studien 51 (1):179-194.
    Nietzsche presents a challenging conception of aesthetics. One of the most well-known discussions on this issue is presented by Heidegger in Der Wille zur Macht als Kunst. In discussing Nietzsche’s aesthetic theory, Heidegger argues that Nietzsche’s reception of Kantian aesthetics is only ever indirect and necessarily mediated by Schopenhauer. His conclusion hinges on what he considers to be a widespread misinterpretation of Kant’s theory of the beautiful, a misinterpretation that begins with Schopenhauer but characterizes all of Kant’s followers, especially Nietzsche. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  24
    Prediction error and regularity detection underlie two dissociable mechanisms for computing the sense of agency.Wen Wen & Patrick Haggard - 2020 - Cognition 195 (C):104074.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Computer simulation through an error-statistical lens.Wendy S. Parker - 2008 - Synthese 163 (3):371-384.
    After showing how Deborah Mayo’s error-statistical philosophy of science might be applied to address important questions about the evidential status of computer simulation results, I argue that an error-statistical perspective offers an interesting new way of thinking about computer simulation models and has the potential to significantly improve the practice of simulation model evaluation. Though intended primarily as a contribution to the epistemology of simulation, the analysis also serves to fill in details of Mayo’s epistemology of experiment.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  10. On the epistemological analysis of modeling and computational error in the mathematical sciences.Nicolas Fillion & Robert M. Corless - 2014 - Synthese 191 (7):1451-1467.
    Interest in the computational aspects of modeling has been steadily growing in philosophy of science. This paper aims to advance the discussion by articulating the way in which modeling and computational errors are related and by explaining the significance of error management strategies for the rational reconstruction of scientific practice. To this end, we first characterize the role and nature of modeling error in relation to a recipe for model construction known as Euler’s recipe. We then describe a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  11. Contemplative Practices: The Cultivation of Discernment in Mind and Heart,”.Cognitive Error - 2009 - Buddhist-Christian Studies 29:59-79.
     
    Export citation  
     
    Bookmark  
  12. Thought insertion and the inseparability thesis.Paul J. Gibbs - 2000 - Philosophy, Psychiatry, and Psychology 7 (3):195-202.
    The essay examines the impact of thought insertion on typical conceptions of self-consciousness. Stephens and Graham have recently argued that thought insertion is compatible with the inseparability thesis, which maintains that with regard to self-consciousness subjectivity is a proper part of introspection--introspection and subjectivity are inseparable. They argue that thought insertion is an error of agency and not an error of subjectivity. The essay contends that even if they are correct in their interpretation that thought (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  13.  81
    Subjective Misidentification and Thought Insertion.Matthew Parrott - 2017 - Mind and Language 32 (1):39-64.
    This essay presents a new account of thought insertion. Prevailing views in both philosophy and cognitive science tend to characterize the experience of thought insertion as missing or lacking some element, such as a ‘sense of agency’, found in ordinary first-person awareness of one's own thoughts. By contrast, I propose that, rather than lacking something, experiences of thought insertion have an additional feature not present in ordinary conscious experiences of one's own thoughts. More specifically, I claim that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  14.  16
    Expertise and Error in Diagnostic Reasoning.Paul E. Johnson, Alica S. Duran, Frank Hassebrock, James Moller, Michael Prietula, Paul J. Feltovich & David B. Swanson - 1981 - Cognitive Science 5 (3):235-283.
    An investigation is presented in which a computer simulation model (DIAGNOSER) is used to develop and test predictions for behavior of subjects in a task of medical diagnosis. The first experiment employed a process‐tracing methodology in order to compare hypothesis generation and evaluation behavior of DIAGNOSER with individuals at different levels of expertise (students, trainees, experts). A second experiment performed with only DIAGNOSER identified conditions under which errors in reasoning in the first experiment could be related to interpretation of specific (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  15. Immunity, thought insertion, and the first-person concept.Michele Palmira - 2020 - Philosophical Studies 177 (12):3833-3860.
    In this paper I aim to illuminate the significance of thought insertion for debates about the first-person concept. My starting point is the often-voiced contention that thought insertion might challenge the thesis that introspection-based self-ascriptions of psychological properties are immune to error through misidentification relative to the first-person concept. In the first part of the paper I explain what a thought insertion-based counterexample to this immunity thesis should be like. I then argue that various thought (...)-involving scenarios do not give rise to successful counterexamples to the immunity of the target class of self-ascriptions. In the second part of the paper I turn to defend a Metasemantic Explanation of why the immunity thesis holds. The Metasemantic Explanation rests on a reference-fixing story about the mental ‘I’ whose key contention is that introspective impressions play an essential role in fixing its reference. It is part of my argument in favour of the proposed reference-fixing story, as well as of the Metasemantic Explanation, that they respect the paradigmatic features of self-ascriptions of inserted thoughts. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  16.  12
    Detection, exploitation and mitigation of memory errors.Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez & Pablo Garcia Bringas - 2024 - Logic Journal of the IGPL 32 (2):281-292.
    Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  16
    Hector freytes, Antonio ledda, Giuseppe sergioli and.Roberto Giuntini & Probabilistic Logics in Quantum Computation - 2013 - In Hanne Andersen, Dennis Dieks, Wenceslao González, Thomas Uebel & Gregory Wheeler (eds.), New Challenges to Philosophy of Science. Springer Verlag. pp. 49.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  29
    Structure and Content in Language Production: A Theory of Frame Constraints in Phonological Speech Errors.Gary S. Dell, Cornell Juliano & Anita Govindjee - 1993 - Cognitive Science 17 (2):149-195.
    Theories of language production propose that utterances are constructed by a mechanism that separates linguistic content from linguistic structure, Linguistic content is retrieved from the mental lexicon, and is then inserted into slots in linguistic structures or frames. Support for this kind of model at the phonological level comes from patterns of phonological speech errors. W present an alternative account of these patterns using a connectionist or parallel distributed proceesing (PDP) model that learns to produce sequences of phonological features. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  19.  28
    Computer modeling and simulation: towards epistemic distinction between verification and validation.Vitaly Pronskikh - unknown
    Verification and validation of computer codes and models used in simulation are two aspects of the scientific practice of high importance and have recently been discussed by philosophers of science. While verification is predominantly associated with the correctness of the way a model is represented by a computer code or algorithm, validation more often refers to model’s relation to the real world and its intended use. It has been argued that because complex simulations are generally not transparent to a practitioner, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  17
    Computer Modeling and Simulation: Increasing Reliability by Disentangling Verification and Validation.Vitaly Pronskikh - 2019 - Minds and Machines 29 (1):169-186.
    Verification and validation of computer codes and models used in simulations are two aspects of the scientific practice of high importance that recently have been discussed widely by philosophers of science. While verification is predominantly associated with the correctness of the way a model is represented by a computer code or algorithm, validation more often refers to the model’s relation to the real world and its intended use. Because complex simulations are generally opaque to a practitioner, the Duhem problem can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  90
    Deep and beautiful. The reward prediction error hypothesis of dopamine.Matteo Colombo - 2014 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 45 (1):57-67.
    According to the reward-prediction error hypothesis of dopamine, the phasic activity of dopaminergic neurons in the midbrain signals a discrepancy between the predicted and currently experienced reward of a particular event. It can be claimed that this hypothesis is deep, elegant and beautiful, representing one of the largest successes of computational neuroscience. This paper examines this claim, making two contributions to existing literature. First, it draws a comprehensive historical account of the main steps that led to the formulation and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  22. Randomness and Recursive Enumerability.Siam J. Comput - unknown
    One recursively enumerable real α dominates another one β if there are nondecreasing recursive sequences of rational numbers (a[n] : n ∈ ω) approximating α and (b[n] : n ∈ ω) approximating β and a positive constant C such that for all n, C(α − a[n]) ≥ (β − b[n]). See [R. M. Solovay, Draft of a Paper (or Series of Papers) on Chaitin’s Work, manuscript, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1974, p. 215] and [G. J. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. Modeling the interaction of computer errors by four-valued contaminating logics.Roberto Ciuni, Thomas Macaulay Ferguson & Damian Szmuc - 2019 - In Rosalie Iemhoff, Michael Moortgat & Ruy de Queiroz (eds.), Logic, Language, Information, and Computation. Berlín, Alemania: pp. 119-139.
    Logics based on weak Kleene algebra (WKA) and related structures have been recently proposed as a tool for reasoning about flaws in computer programs. The key element of this proposal is the presence, in WKA and related structures, of a non-classical truth-value that is “contaminating” in the sense that whenever the value is assigned to a formula ϕ, any complex formula in which ϕ appears is assigned that value as well. Under such interpretations, the contaminating states represent occurrences of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Memory and self-consciousness: immunity to error through misidentification.Andy Hamilton - 2009 - Synthese 171 (3):409-417.
    In The Blue Book, Wittgenstein defined a category of uses of “I” which he termed “I”-as-subject, contrasting them with “I”-as-object uses. The hallmark of this category is immunity to error through misidentification (IEM). This article extends Wittgenstein’s characterisation to the case of memory-judgments, discusses the significance of IEM for self-consciousness—developing the idea that having a first-person thought involves thinking about oneself in a distinctive way in which one cannot think of anyone or anything else—and refutes a common objection to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  25.  18
    Deep and beautiful. The reward prediction error hypothesis of dopamine.Matteo Colombo - 2013 - Studies in History and Philosophy of Biological and Biomedical Sciences 45:57-67.
    According to the reward-prediction error hypothesis (RPEH) of dopamine, the phasic activity of dopaminergic neurons in the midbrain signals a discrepancy between the predicted and currently experienced reward of a particular event. It can be claimed that this hypothesis is deep, elegant and beautiful, representing one of the largest successes of computational neuroscience. This paper examines this claim, making two contributions to existing literature. First, it draws a comprehensive historical account of the main steps that led to the formulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Trial and error mathematics: Dialectical systems and completions of theories.Luca San Mauro, Jacopo Amidei, Uri Andrews, Duccio Pianigiani & Andrea Sorbi - 2019 - Journal of Logic and Computation 1 (29):157-184.
    This paper is part of a project that is based on the notion of a dialectical system, introduced by Magari as a way of capturing trial and error mathematics. In Amidei et al. (2016, Rev. Symb. Logic, 9, 1–26) and Amidei et al. (2016, Rev. Symb. Logic, 9, 299–324), we investigated the expressive and computational power of dialectical systems, and we compared them to a new class of systems, that of quasi-dialectical systems, that enrich Magari’s systems with a natural (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  27
    Understanding Error Rates in Software Engineering: Conceptual, Empirical, and Experimental Approaches.Jack K. Horner & John Symons - 2019 - Philosophy and Technology 32 (2):363-378.
    Software-intensive systems are ubiquitous in the industrialized world. The reliability of software has implications for how we understand scientific knowledge produced using software-intensive systems and for our understanding of the ethical and political status of technology. The reliability of a software system is largely determined by the distribution of errors and by the consequences of those errors in the usage of that system. We select a taxonomy of software error types from the literature on empirically observed software errors and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  28.  83
    Computational Models of Performance Monitoring and Cognitive Control.William H. Alexander & Joshua W. Brown - 2010 - Topics in Cognitive Science 2 (4):658-677.
    The medial prefrontal cortex (mPFC) has been the subject of intense interest as a locus of cognitive control. Several computational models have been proposed to account for a range of effects, including error detection, conflict monitoring, error likelihood prediction, and numerous other effects observed with single-unit neurophysiology, fMRI, and lesion studies. Here, we review the state of computational models of cognitive control and offer a new theoretical synthesis of the mPFC as signaling response–outcome predictions. This new synthesis has (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  29.  22
    Error, Reliability and Health-Related Digital Autonomy in AI Diagnoses of Social Media Analysis.Ramón Alvarado & Nicolae Morar - 2021 - American Journal of Bioethics 21 (7):26-28.
    The rapid expansion of computational tools and of data science methods in healthcare has, undoubtedly, raised a whole new set of bioethical challenges. As Laacke and colleagues rightly note,...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  17
    Outlines of a Pragmatic Theory of Truth and Error in Computer Simulation.Andreas Kaminski & Christoph Hubig - 2017 - In Michael Resch, Andreas Kaminski & Petra Gehring (eds.), The Science and Art of Simulation I Exploring - Understanding - Knowing. Heidelberg: Springer. pp. 121-136.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  31.  30
    The Epistemologies of Non-Forecasting Simulations, Part II: Climate, Chaos, Computing Style, and the Contextual Plasticity of Error.Lambert Williams & William Thomas - 2009 - Science in Context 22 (2):271-310.
    ArgumentWe continue our analysis of modeling practices that focus more on qualitative understanding of system behavior than the attempt to provide sharp forecasts. The argument here is built around three episodes: the ambitious work of the Princeton Meteorological Project; the seemingly simple models of convection in weather systems by Edward Lorenz at MIT; and then finally analysis of the dripping faucet by Robert Shaw and the Dynamical Systems Collective at UC Santa Cruz. Using the Princeton Meteorological Project as an argumentative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  8
    Computer science and information vision of the world from the standpoint of the principle of materialistic monism.Nikolai Andreevich Popov - 2022 - Философия И Культура 2:47-72.
    The subject of this study is the problem of the failure of attempts by the scientific community to come to a common understanding of what exactly information can be as something encoded into material structures and moved along with them. At the same time, the following aspects of this problem are considered in detail: what is the immediate cause of the information problem; what are the objective and subjective prerequisites for its appearance; why the unresolved nature of this problem does (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  13
    Intuition and Ingenuity: Gödel on Turing’s “Philosophical Error”.Long Chen - 2022 - Philosophies 7 (2):33.
    Despite his unreserved appreciation of Turing’s analysis for being a “precise and unquestionably adequate definition” of formal system or mechanical computability, Gödel nevertheless published a short note in 1972 claiming to have found a “philosophical error” in Turing’s argument with regard to the finite nature of mental states and memory. A natural question arises: how could Gödel enjoy the generality conferred on his results by Turing’s work, despite the error of its ways? Previous interpretative strategies by Feferman, Shagrir (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  21
    The Nature and Origin of Rational Errors in Arithmetic Thinking: Induction from Examples and Prior Knowledge.Talia Ben-Zeev - 1995 - Cognitive Science 19 (3):341-376.
    Students systematically and deliberately apply rule‐based but erroneous algorithms to solving unfamiliar arithmetic problems. These algorithms result in erroneous solutions termed rational errors. Computationally, students' erroneous algorithms can be represented by perturbations or bugs in otherwise correct arithmetic algorithms (Brown & VanLehn, 1980; Langley & Ohilson, 1984; VanLehn, 1983, 1986, 1990; Young S O'Sheo, 1981). Bugs are useful for describing how rational errors occur but bugs are not sufficient for explaining their origin. A possible explanation for this is that rational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  35.  40
    Proof Systems for Reasoning about Computation Errors.Arnon Avron & Beata Konikowska - 2009 - Studia Logica 91 (2):273-293.
    In the paper we examine the use of non-classical truth values for dealing with computation errors in program specification and validation. In that context, 3-valued McCarthy logic is suitable for handling lazy sequential computation, while 3-valued Kleene logic can be used for reasoning about parallel computation. If we want to be able to deal with both strategies without distinguishing between them, we combine Kleene and McCarthy logics into a logic based on a non-deterministic, 3-valued matrix, incorporating both options as a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  36
    Computational scientific discovery and cognitive science theories.M. Addis, Peter D. Sozou, F. Gobet & Philip R. Lane - unknown
    This study is concerned with processes for discovering new theories in science. It considers a computational approach to scientific discovery, as applied to the discovery of theories in cognitive science. The approach combines two ideas. First, a process-based scientific theory can be represented as a computer program. Second, an evolutionary computational method, genetic programming, allows computer programs to be improved through a process of computational trialand-error. Putting these two ideas together leads to a system that can automatically generate and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Section 2. Model Theory.Va Vardanyan, On Provability Resembling Computability, Proving Aa Voronkov & Constructive Logic - 1989 - In Jens Erik Fenstad, Ivan Timofeevich Frolov & Risto Hilpinen (eds.), Logic, Methodology, and Philosophy of Science Viii: Proceedings of the Eighth International Congress of Logic, Methodology, and Philosophy of Science, Moscow, 1987. Sole Distributors for the U.S.A. And Canada, Elsevier Science.
    No categories
     
    Export citation  
     
    Bookmark  
  38.  66
    About and Around Computing Over the Reals.Solomon Feferman - unknown
    1. One theory or many? In 2004 a very interesting and readable article by Lenore Blum, entitled “Computing over the reals: Where Turing meets Newton,” appeared in the Notices of the American Mathematical Society. It explained a basic model of computation over the reals due to Blum, Michael Shub and Steve Smale (1989), subsequently exposited at length in their influential book, Complexity and Real Computation (1997), coauthored with Felipe Cucker. The ‘Turing’ in the title of Blum’s article refers of course (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. A Computational and Empirical Investigation of Graphemes in Reading.Conrad Perry, Johannes C. Ziegler & Marco Zorzi - 2013 - Cognitive Science 37 (5):800-828.
    It is often assumed that graphemes are a crucial level of orthographic representation above letters. Current connectionist models of reading, however, do not address how the mapping from letters to graphemes is learned. One major challenge for computational modeling is therefore developing a model that learns this mapping and can assign the graphemes to linguistically meaningful categories such as the onset, vowel, and coda of a syllable. Here, we present a model that learns to do this in English for strings (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The quantization error in a Self-Organizing Map as a contrast and color specific indicator of single-pixel change in large random patterns.Birgitta Dresp-Langley - 2019 - Neural Networks 120:116-128..
    The quantization error in a fixed-size Self-Organizing Map (SOM) with unsupervised winner-take-all learning has previously been used successfully to detect, in minimal computation time, highly meaningful changes across images in medical time series and in time series of satellite images. Here, the functional properties of the quantization error in SOM are explored further to show that the metric is capable of reliably discriminating between the finest differences in local contrast intensities and contrast signs. While this capability of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  12
    Modeling Misretrieval and Feature Substitution in Agreement Attraction: A Computational Evaluation.Dario Paape, Serine Avetisyan, Sol Lago & Shravan Vasishth - 2021 - Cognitive Science 45 (8):e13019.
    We present computational modeling results based on a self‐paced reading study investigating number attraction effects in Eastern Armenian. We implement three novel computational models of agreement attraction in a Bayesian framework and compare their predictive fit to the data using k‐fold cross‐validation. We find that our data are better accounted for by an encoding‐based model of agreement attraction, compared to a retrieval‐based model. A novel methodological contribution of our study is the use of comprehension questions with open‐ended responses, so that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  19
    Privileged Access and the Agent in the Thought-Insertion.Clara S. Humpston - 2018 - Philosophy, Psychiatry, and Psychology 25 (3):165-167.
    In his paper, Young has eloquently put forward a novel account of how and why the phenomenon of thought-insertion seen in patients with schizophrenia does not contradict the immunity principle. He argues that, in TI, the problem lies not in misidentification but in mispredication: the individual with TI does not ascribe the right predicate to the wrong subject, but has misdetected the predicate in the first place. The author points out that an inconsistently formulated immunity principle could risk confusing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  30
    A Computational Model of the Circulating Renin-Angiotensin System and Blood Pressure Regulation.François Guillaud & Patrick Hannaert - 2010 - Acta Biotheoretica 58 (2-3):143-170.
    The renin-angiotensin system (RAS) is critical in sodium and blood pressure (BP) regulation, and in cardiovascular-renal (CVR) diseases and therapeutics. As a contribution to SAPHIR project, we present a realistic computer model of renin production and circulating RAS, integrated into Guyton’s circulatory model ( GCM ). Juxtaglomerular apparatus, JGA , and Plasma modules were implemented in C ++/M2SL (Multi-formalism Multi-resolution Simulation Library) for fusion with GCM . Matlab © optimization toolboxes were used for parameter identification. In JGA , renin production (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Information theory, evolutionary computation, and Dembski’s “complex specified information”.Wesley Elsberry & Jeffrey Shallit - 2011 - Synthese 178 (2):237 - 270.
    Intelligent design advocate William Dembski has introduced a measure of information called "complex specified information", or CSI. He claims that CSI is a reliable marker of design by intelligent agents. He puts forth a "Law of Conservation of Information" which states that chance and natural laws are incapable of generating CSI. In particular, CSI cannot be generated by evolutionary computation. Dembski asserts that CSI is present in intelligent causes and in the flagellum of Escherichia coli, and concludes that neither have (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  45.  15
    Formal verification, scientific code, and the epistemological heterogeneity of computational science.Cyrille Imbert & Vincent Ardourel - unknown
    Various errors can affect scientific code and detecting them is a central concern within computational science. Could formal verification methods, which are now available tools, be widely adopted to guarantee the general reliability of scientific code? After discussing their benefits and drawbacks, we claim that, absent significant changes as regards features like their user-friendliness and versatility, these methods are unlikely to be adopted throughout computational science, beyond certain specific contexts for which they are well-suited. This issue exemplifies the epistemological heterogeneity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  46.  7
    Developing a feeling for error: Practices of monitoring and modelling air pollution data.Emma Garnett - 2016 - Big Data and Society 3 (2).
    This paper is based on ethnographic research of data practices in a public health project called Weather Health and Air Pollution. I examine two different kinds of practices that make air pollution data, focusing on how they relate to particular modes of sensing and articulating air pollution. I begin by describing the interstitial spaces involved in making measurements of air pollution at monitoring sites and in the running of a computer simulation. Specifically, I attend to a shared dimension of these (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  47.  9
    The end of an error: Bianchini, Regiomontanus, and the tabulation of stellar coordinates.Glen Van Brummelen - 2018 - Archive for History of Exact Sciences 72 (5):547-563.
    Giovanni Bianchini’s fifteenth-century Tabulae primi mobilis is a collection of 50 pages of canons and 100 pages of tables of spherical astronomy and mathematical astrology, beginning with a treatment of the conversion of stellar coordinates from ecliptic to equatorial. His new method corrects a long-standing error made by a number of his antecedents, and with his tables the computations are much more efficient than in Ptolemy’s Almagest. The completely novel structure of Bianchini’s tables, here and in his Tabulae (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Paul M. kjeldergaard.Pittsburgh Computations Centers - 1968 - In T. Dixon & Deryck Horton (eds.), Verbal Behavior and General Behavior Theory. Prentice-Hall.
    No categories
     
    Export citation  
     
    Bookmark  
  49.  34
    Visualization, pattern recognition, and forward search: effects of playing speed and sight of the position on grandmaster chess errors.Christopher F. Chabris & Eliot S. Hearst - 2003 - Cognitive Science 27 (4):637-648.
    A new approach examined two aspects of chess skill, long a popular topic in cognitive science. A powerful computer‐chess program calculated the number and magnitude of blunders made by the same 23 grandmasters in hundreds of serious games of slow (“classical”) chess, regular “rapid” chess, and rapid “blindfold” chess, in which opponents transmit moves without ever seeing the actual position. Rapid chess led to substantially more and larger blunders than classical chess. Perhaps more surprisingly, the frequency and magnitude of blunders (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  50.  10
    The end of an error: Bianchini, Regiomontanus, and the tabulation of stellar coordinates.Glen Brummelen - 2018 - Archive for History of Exact Sciences 72 (5):547-563.
    Giovanni Bianchini’s fifteenth-century Tabulae primi mobilis is a collection of 50 pages of canons and 100 pages of tables of spherical astronomy and mathematical astrology, beginning with a treatment of the conversion of stellar coordinates from ecliptic to equatorial. His new method corrects a long-standing error made by a number of his antecedents, and with his tables the computations are much more efficient than in Ptolemy’s Almagest. The completely novel structure of Bianchini’s tables, here and in his Tabulae (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 1000