Results for 'Utility Computing'

1000+ found
Order:
  1.  73
    Computational Rationality: Linking Mechanism and Behavior Through Bounded Utility Maximization.Richard L. Lewis, Andrew Howes & Satinder Singh - 2014 - Topics in Cognitive Science 6 (2):279-311.
    We propose a framework for including information‐processing bounds in rational analyses. It is an application of bounded optimality (Russell & Subramanian, 1995) to the challenges of developing theories of mechanism and behavior. The framework is based on the idea that behaviors are generated by cognitive mechanisms that are adapted to the structure of not only the environment but also the mind and brain itself. We call the framework computational rationality to emphasize the incorporation of computational mechanism into the definition of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  2.  27
    On computer science, visual science, and the physiological utility of models.Barry J. Richmond & Michael E. Goldberg - 1985 - Behavioral and Brain Sciences 8 (2):300-301.
  3.  3
    AMCAT Utility to Engineering and Computer Science Students.S. Jainab Zareena - 2020 - Bulletin of Science, Technology and Society 40 (3-4):54-58.
    Aspiring Minds Computer Adaptive Test (AMCAT) is a computer adaptive test used widely in India to assess the employability skill level of engineering students. Prefinal and final year students belonging to different streams take up this online test. The present study investigates the perception of students regarding the conduct of AMCAT. Furthermore, the study explores the benefits that they obtain through the test. The comparison is made among the students belonging to the two different streams, engineering and computer science. The (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  5
    Computing rank dependent utility in graphical models for sequential decision problems.Gildas Jeantet & Olivier Spanjaard - 2011 - Artificial Intelligence 175 (7-8):1366-1389.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. On the computational utility of consciousness.D. W. Mathis & M. Moxer - 1995 - In G. Tesauro, D. Touretzky & T. Leen (eds.), Advances in Neural Information Processing Systems 7. MIT Press.
  6. Computation in Physical Systems: A Normative Mapping Account.Paul Schweizer - 2019 - In Matteo Vincenzo D'Alfonso & Don Berkich (eds.), On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer Verlag. pp. 27-47.
    The relationship between abstract formal procedures and the activities of actual physical systems has proved to be surprisingly subtle and controversial, and there are a number of competing accounts of when a physical system can be properly said to implement a mathematical formalism and hence perform a computation. I defend an account wherein computational descriptions of physical systems are high-level normative interpretations motivated by our pragmatic concerns. Furthermore, the criteria of utility and success vary according to our diverse purposes (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  7.  25
    Representing Utility Functions via Weighted Goals.Joel Uckelman, Yann Chevaleyre, Ulle Endriss & Jérôme Lang - 2009 - Mathematical Logic Quarterly 55 (4):341-361.
    We analyze the expressivity, succinctness, and complexity of a family of languages based on weighted propositional formulas for the representation of utility functions. The central idea underlying this form of preference modeling is to associate numerical weights with goals specified in terms of propositional formulas, and to compute the utility value of an alternative as the sum of the weights of the goals it satisfies. We define a large number of representation languages based on this idea, each characterized (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  8.  22
    The Utility of Cognitive Plausibility in Language Acquisition Modeling: Evidence From Word Segmentation.Lawrence Phillips & Lisa Pearl - 2015 - Cognitive Science 39 (8):1824-1854.
    The informativity of a computational model of language acquisition is directly related to how closely it approximates the actual acquisition task, sometimes referred to as the model's cognitive plausibility. We suggest that though every computational model necessarily idealizes the modeled task, an informative language acquisition model can aim to be cognitively plausible in multiple ways. We discuss these cognitive plausibility checkpoints generally and then apply them to a case study in word segmentation, investigating a promising Bayesian segmentation strategy. We incorporate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9. A Utility Based Evaluation of Logico-probabilistic Systems.Paul D. Thorn & Gerhard Schurz - 2014 - Studia Logica 102 (4):867-890.
    Systems of logico-probabilistic (LP) reasoning characterize inference from conditional assertions interpreted as expressing high conditional probabilities. In the present article, we investigate four prominent LP systems (namely, systems O, P, Z, and QC) by means of computer simulations. The results reported here extend our previous work in this area, and evaluate the four systems in terms of the expected utility of the dispositions to act that derive from the conclusions that the systems license. In addition to conforming to the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  76
    Computational Analyses of Multilevel Discourse Comprehension.Arthur C. Graesser & Danielle S. McNamara - 2011 - Topics in Cognitive Science 3 (2):371-398.
    The proposed multilevel framework of discourse comprehension includes the surface code, the textbase, the situation model, the genre and rhetorical structure, and the pragmatic communication level. We describe these five levels when comprehension succeeds and also when there are communication misalignments and comprehension breakdowns. A computer tool has been developed, called Coh-Metrix, that scales discourse (oral or print) on dozens of measures associated with the first four discourse levels. The measurement of these levels with an automated tool helps researchers track (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  32
    The computational complexity of hybrid temporal logics.C. Areces, P. Blackburn & M. Marx - 2000 - Logic Journal of the IGPL 8 (5):653-679.
    In their simplest form, hybrid languages are propositional modal languages which can refer to states. They were introduced by Arthur Prior, the inventor of tense logic, and played an important role in his work: because they make reference to specific times possible, they remove the most serious obstacle to developing modal approaches to temporal representation and reasoning. However very little is known about the computational complexity of hybrid temporal logics.In this paper we analyze the complexity of the satisfiability problem of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  12.  82
    Utility and Language Generation: The Case of Vagueness.Kees van Deemter - 2009 - Journal of Philosophical Logic 38 (6):607 - 632.
    This paper asks why information should ever be expressed vaguely, re-assessing some previously proposed answers to this question and suggesting some new ones. Particular attention is paid to the benefits that vague expressions can have in situations where agreement over the meaning of an expression cannot be taken for granted. A distinction between two different versions of the above-mentioned question is advocated. The first asks why human languages contain vague expressions, the second question asks when and why a speaker should (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  13.  86
    Intertemporal utility smoothing under uncertainty.Katsutoshi Wakai - 2013 - Theory and Decision 74 (2):285-310.
    This paper axiomatizes a recursive utility model that captures both intertemporal utility smoothing defined across time and ambiguity aversion defined over states. The resulting representation adapts Wakai model of intertemporal utility smoothing as an aggregator function, where the utility of the certainty equivalent of future uncertainty is computed by Gilboa and Schmeidler multiple-priors utility. The model also permits the separation of intertemporal utility smoothing from ambiguity aversion.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  30
    Brain Computer Interfaces and Communication Disabilities: Ethical, Legal, and Social Aspects of Decoding Speech From the Brain.Jennifer A. Chandler, Kiah I. Van der Loos, Susan Boehnke, Jonas S. Beaudry, Daniel Z. Buchman & Judy Illes - 2022 - Frontiers in Human Neuroscience 16:841035.
    A brain-computer interface technology that can decode the neural signals associated with attempted but unarticulated speech could offer a future efficient means of communication for people with severe motor impairments. Recent demonstrations have validated this approach. Here we assume that it will be possible in future to decode imagined (i.e., attempted but unarticulated) speech in people with severe motor impairments, and we consider the characteristics that could maximize the social utility of a BCI for communication. As a social interaction, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  17
    Utility and Language Generation: The Case of Vagueness.Kees Deemter - 2009 - Journal of Philosophical Logic 38 (6):607-632.
    This paper asks why information should ever be expressed vaguely, re-assessing some previously proposed answers to this question and suggesting some new ones. Particular attention is paid to the benefits that vague expressions can have in situations where agreement over the meaning of an expression cannot be taken for granted. A distinction between two different versions of the above-mentioned question is advocated. The first asks why human languages contain vague expressions, the second question asks when and why a speaker should (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  16. Utility-Based Generation of Referring Expressions.Markus Guhe - 2012 - Topics in Cognitive Science 4 (2):306-329.
    This paper presents two cognitive models that simulate the production of referring expressions in the iMAP task—a task-oriented dialog. One general model is based on Dale and Reiter’s (1995)incremental algorithm, and the other is a simple template model that has a higher correlation with the data but is specifically geared toward the properties of the iMAP task. The property of the iMAP task environment that is modeled here is that the color feature is unreliable for identifying referents while other features (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17.  18
    Computational Goals, Values and Decision-Making.Louise A. Dennis - 2020 - Science and Engineering Ethics 26 (5):2487-2495.
    Considering the popular framing of an artificial intelligence as a rational agent that always seeks to maximise its expected utility, referred to as its goal, one of the features attributed to such rational agents is that they will never select an action which will change their goal. Therefore, if such an agent is to be friendly towards humanity, one argument goes, we must understand how to specify this friendliness in terms of a utility function. Wolfhart Totschnig, argues in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  83
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19. Computer, Proof, and Testimony.Kai-Yee Wong - 2012 - Studies in Logic 5 (1):50-67.
    It has been claimed that computer-assisted proof utilizes empirical evidence in a manner unheard of in traditional mathematics and therefore its employment forces us to modify our conception of proof. This paper provides a critical survey of some arguments for this claim. It starts by revisiting a well known paper by Thomas Tymoczko on the computer proof of the Four-Color Theorem. Drawing on some ideas from the works of Tyler Burge and others, it then considers a way to see the (...)
     
    Export citation  
     
    Bookmark  
  20.  34
    Intuition, Computation, and Information.Ken Herold - 2014 - Minds and Machines 24 (1):85-88.
    Bynum (Putting information first: Luciano Floridi and the philosophy of information. NY: Wiley-Blackwell, 2010) identifies Floridi’s focus in the philosophy of information (PI) on entities both as data structures and as information objects. One suggestion for examining the association between the former and the latter stems from Floridi’s Herbert A. Simon Lecture in Computing and Philosophy given at Carnegie Mellon University in 2001, open problems in the PI: the transduction or transception, and how we gain knowledge about the world (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  91
    Brains as analog-model computers.Oron Shagrir - 2010 - Studies in History and Philosophy of Science Part A 41 (3):271-279.
    Computational neuroscientists not only employ computer models and simulations in studying brain functions. They also view the modeled nervous system itself as computing. What does it mean to say that the brain computes? And what is the utility of the ‘brain-as-computer’ assumption in studying brain functions? In previous work, I have argued that a structural conception of computation is not adequate to address these questions. Here I outline an alternative conception of computation, which I call the analog-model. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  22. Improving the Quality and Utility of Electronic Health Record Data through Ontologies.Asiyah Yu Lin, Sivaram Arabandi, Thomas Beale, William Duncan, Hicks D., Hogan Amanda, R. William, Mark Jensen, Ross Koppel, Catalina Martínez-Costa, Øystein Nytrø, Jihad S. Obeid, Jose Parente de Oliveira, Alan Ruttenberg, Selja Seppälä, Barry Smith, Dagobert Soergel, Jie Zheng & Stefan Schulz - 2023 - Standards 3 (3):316–340.
    The translational research community, in general, and the Clinical and Translational Science Awards (CTSA) community, in particular, share the vision of repurposing EHRs for research that will improve the quality of clinical practice. Many members of these communities are also aware that electronic health records (EHRs) suffer limitations of data becoming poorly structured, biased, and unusable out of original context. This creates obstacles to the continuity of care, utility, quality improvement, and translational research. Analogous limitations to sharing objective data (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. Computing with causal theories.Erkan Tin & Varol Akman - 1992 - International Journal of Pattern Recognition and Artificial Intelligence 6 (4):699-730.
    Formalizing commonsense knowledge for reasoning about time has long been a central issue in AI. It has been recognized that the existing formalisms do not provide satisfactory solutions to some fundamental problems, viz. the frame problem. Moreover, it has turned out that the inferences drawn do not always coincide with those one had intended when one wrote the axioms. These issues call for a well-defined formalism and useful computational utilities for reasoning about time and change. Yoav Shoham of Stanford University (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  24
    Computational modelling of protein interactions: Energy minimization for the refinement and scoring of association decoys.Alexander Dibrov, Yvonne Myal & Etienne Leygue - 2009 - Acta Biotheoretica 57 (4):419-428.
    The prediction of protein–protein interactions based on independently obtained structural information for each interacting partner remains an important challenge in computational chemistry. Procedures where hypothetical interaction models (or decoys) are generated, then ranked using a biochemically relevant scoring function have been garnering interest as an avenue for addressing such challenges. The program PatchDock has been shown to produce reasonable decoys for modeling the association between pig alpha-amylase and the VH-domains of camelide antibody raised against it. We designed a biochemically relevant (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  5
    The Computations Underlying Religious Conversion: A Bayesian Decision Model.Francesco Rigoli - 2023 - Journal of Cognition and Culture 23 (1-2):241-257.
    Inspired by recent Bayesian interpretations about the psychology underlying religion, the paper introduces a theory proposing that religious conversion is shaped by three factors: (i) novel relevant information, experienced in perceptual or in social form (e.g., following interaction with missionaries); (ii) changes in the utility (e.g., expressed in an opportunity to raise in social rank) associated with accepting a new religious creed; and (iii) prior beliefs, favouring religious faiths that, although new, still remain consistent with entrenched cultural views (resulting (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  12
    Soft computing based compressive sensing techniques in signal processing: A comprehensive review.Sanjay Jain & Ishani Mishra - 2020 - Journal of Intelligent Systems 30 (1):312-326.
    In this modern world, a massive amount of data is processed and broadcasted daily. This includes the use of high energy, massive use of memory space, and increased power use. In a few applications, for example, image processing, signal processing, and possession of data signals, etc., the signals included can be viewed as light in a few spaces. The compressive sensing theory could be an appropriate contender to manage these limitations. “Compressive Sensing theory” preserves extremely helpful while signals are sparse (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. The futile search for true utility.Roberto Fumagalli - 2013 - Economics and Philosophy 29 (3):325-347.
    In traditional decision theory, utility is regarded as a mathematical representation of preferences to be inferred from agents hedonic experiences. Some go as far as to contend that utility is literally computed by specific neural areas and urge economists to complement or substitute their notion of utility with some neuro-psychological construct. In this paper, I distinguish three notions of utility that are frequently mentioned in debates about decision theory and examine some critical issues regarding their definition (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  28.  8
    PUC: parallel mining of high-utility itemsets with load balancing on spark.Geetha Maiya, Harish Sheeranalli Venkatarama & Anup Bhat Brahmavar - 2022 - Journal of Intelligent Systems 31 (1):568-588.
    Distributed programming paradigms such as MapReduce and Spark have alleviated sequential bottleneck while mining of massive transaction databases. Of significant importance is mining High Utility Itemset that incorporates the revenue of the items purchased in a transaction. Although a few algorithms to mine HUIs in the distributed environment exist, workload skew and data transfer overhead due to shuffling operations remain major issues. In the current study, Parallel Utility Computation algorithm has been proposed with novel grouping and load balancing (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  86
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  65
    The Evolution of a Goal-Directed Exploration Model: Effects of Information Scent and GoBack Utility on Successful Exploration.Leonghwee Teo & Bonnie E. John - 2011 - Topics in Cognitive Science 3 (1):154-165.
    We explore the match of a computational information foraging model to participant data on multi-page web search tasks and find its correlation on several important metrics to be too low to be used with confidence in the evaluation of user-interface designs. We examine the points of mismatch to inspire changes to the model in how it calculates information scent scores and how it assesses the utility of backing up from a lower-level page to a higher-level page. The outcome is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  22
    Traces of a computational mind.Massimiliano Lorenzo Cappuccio - 2003 - Revue de Synthèse 124 (1):43-59.
    L'image de l'écriture est singulièrement fréquente dans des explications cognitivistes du fonctionnement de l'esprit, non seulement comme métaphore mais également comme paradigme conceptuel: la machine de Turing, en particulier, montre un isomorphisme structural complet avec l'utilisation de l'écriture alphabétique. La machine de Turing effectue exactement les mêmes opérations effectuées par un homme écrivant avec le stylo et le papier et cela dépend de deux raisons: 1. il a été conçu dans l'image et la similarité de la pratique concrète humaine de (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  23
    The Educational Use of Computer Based Science Simulations: Some Lessons from the Philosophy of Science.William J. McKinney - 1997 - Science & Education 6 (6):591-603.
    Examines some of the potential and some of the problems inherent in using computerized simulations in science and science studies classes by applying lessons from the epistemology of science. While computer simulations are useful pedagogical tools, they are not experiments and thus are of only limited utility as substitutes for actual laboratories. Contains 20 references. (Author/PVD).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. Abstraction, law, and freedom in computer science.Timothy Colburn & Gary Shute - 2010 - Metaphilosophy 41 (3):345-364.
    Abstract: Laws of computer science are prescriptive in nature but can have descriptive analogs in the physical sciences. Here, we describe a law of conservation of information in network programming, and various laws of computational motion (invariants) for programming in general, along with their pedagogical utility. Invariants specify constraints on objects in abstract computational worlds, so we describe language and data abstraction employed by software developers and compare them to Floridi's concept of levels of abstraction. We also consider Floridi's (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  6
    Neural Network-Based Intelligent Computing Algorithms for Discrete-Time Optimal Control with the Application to a Cyberphysical Power System.Feng Jiang, Kai Zhang, Jinjing Hu & Shunjiang Wang - 2021 - Complexity 2021:1-10.
    Adaptive dynamic programming, which belongs to the field of computational intelligence, is a powerful tool to address optimal control problems. To overcome the bottleneck of solving Hamilton–Jacobi–Bellman equations, several state-of-the-art ADP approaches are reviewed in this paper. First, two model-based offline iterative ADP methods including policy iteration and value iteration are given, and their respective advantages and shortcomings are discussed in detail. Second, the multistep heuristic dynamic programming method is introduced, which avoids the requirement of initial admissible control and achieves (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  14
    Rational Choice Using Imprecise Probabilities and Utilities.Paul Weirich - 2021 - Cambridge: Cambridge University Press.
    An agent often does not have precise probabilities or utilities to guide resolution of a decision problem. I advance a principle of rationality for making decisions in such cases. To begin, I represent the doxastic and conative state of an agent with a set of pairs of a probability assignment and a utility assignment. Then I support a decision principle that allows any act that maximizes expected utility according to some pair of assignments in the set. Assuming that (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. Medical diagnostic reasoning: Epistemological modeling as a strategy for design of computer-based consultation programs.Giovanni Barosi, Lorenzo Magnani & Mario Stefanelli - 1993 - Theoretical Medicine and Bioethics 14 (1).
    The complexity of cognitive emulation of human diagnostic reasoning is the major challenge in the implementation of computer-based programs for diagnostic advice in medicine. We here present an epistemological model of diagnosis with the ultimate goal of defining a high-level language for cognitive and computational primitives. The diagnostic task proceeds through three different phases: hypotheses generation, hypotheses testing and hypotheses closure. Hypotheses generation has the inferential form of abduction (from findings to hypotheses) constrained under the criterion of plausibility. Hypotheses testing (...)
     
    Export citation  
     
    Bookmark   3 citations  
  37.  41
    The Unique and Practical Advantages of Applying A Capability Approach to Brain Computer Interface.Andrew Ko & Nancy S. Jecker - 2022 - Philosophy and Technology 35 (4):1-22.
    Intelligent neurotechnology is an emerging field that combines neurotechnologies like brain-computer interface (BCI) with artificial intelligence. This paper introduces a capability framework to assess the responsible use of intelligent BCI systems and provide practical ethical guidance. It proposes two tests, the threshold and flourishing tests, that BCI applications must meet, and illustrates them in a series of cases. After a brief introduction (Section 1), Section 2 sets forth the capability view and the two tests. It illustrates the threshold test using (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  49
    Notes towards a definition of human-centred computing.Chris Boyne - 1994 - AI and Society 8 (1):60-70.
    Current usage of the expression “human-centred” in computing contexts suffers from a lack of clarity, and involves internal contradictions. It is not enough to base the concept of human-centredness on ideas of social utility, collaborative working or human controllability. However, the concept of human action (which embodies reference to human freedom) provides a theoretical underpinning to human-centredness by combining, from a human standpoint, concern with process and concern with goals. This has consequences for the design process, prompting us (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  39.  26
    Juricas: Legal computer advice systems. [REVIEW]J. G. L. Weeks - 1992 - Artificial Intelligence and Law 1 (4):275-290.
    In the late seventies at the Centre for Computers and Law research was started to find means for supporting lawyers' work with the aid of a computer. The research project was called JURICAS. In 1982 a prototype of a JURICAS system was produced and since 1986 seven advisory packages have been brought out on the market in the Netherlands. These packages consist of two main parts, an author's shell and an advisory program. The user cannot make changes to either the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  23
    Selective Ignorance and Multiple Scales in Biology: Deciding on Criteria for Model Utility[REVIEW]Louis J. Gross - 2013 - Biological Theory 8 (1):74-79.
    Much of the scientific process involves “selective ignorance”: we include certain aspects of the systems we are considering and ignore others. This is inherent in the models that we utilize as proxies for biological systems. Our goal usually is to isolate components of these systems and consider them at only certain temporal and spatial scales. The scales and questions induce different metrics for what might be considered a “good” model. The study of mathematical and computational models is replete with differing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  9
    Items Outperform Adjectives in a Computational Model of Binary Semantic Classification.Evgeniia Diachek, Sarah Brown-Schmidt & Sean M. Polyn - 2023 - Cognitive Science 47 (9):e13336.
    Semantic memory encompasses one's knowledge about the world. Distributional semantic models, which construct vector spaces with embedded words, are a proposed framework for understanding the representational structure of human semantic knowledge. Unlike some classic semantic models, distributional semantic models lack a mechanism for specifying the properties of concepts, which raises questions regarding their utility for a general theory of semantic knowledge. Here, we develop a computational model of a binary semantic classification task, in which participants judged target words for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  7
    Probing Lexical Ambiguity in Chinese Characters via Their Word Formations: Convergence of Perceived and Computed Metrics.Tianqi Wang, Xu Xu, Xurong Xie & Manwa Lawrence Ng - 2023 - Cognitive Science 47 (11):e13379.
    Lexical ambiguity is pervasive in language, and the nature of the representations of an ambiguous word's multiple meanings is yet to be fully understood. With a special focus on Chinese characters, the present study first established that native speaker's perception about a character's number of meanings was heavily influenced by the availability of its distinct word formations, while whether these meanings would be perceived to be closely related was driven by further conceptual analysis. These notions were operationalized as two computed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  17
    Locative media and data-driven computing experiments.Leighton Evans, Rob Kitchin & Sung-Yueh Perng - 2016 - Big Data and Society 3 (1).
    Over the past two decades urban social life has undergone a rapid and pervasive geocoding, becoming mediated, augmented and anticipated by location-sensitive technologies and services that generate and utilise big, personal, locative data. The production of these data has prompted the development of exploratory data-driven computing experiments that seek to find ways to extract value and insight from them. These projects often start from the data, rather than from a question or theory, and try to imagine and identify their (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. The relationship between the neural computations for speech and music perception is context-dependent: an activation likelihood estimate study.Arianna LaCroix, Alvaro F. Diaz & Corianne Rogalsky - 2015 - Frontiers in Psychology 6:144900.
    The relationship between the neurobiology of speech and music has been investigated for more than a century. There remains no widespread agreement regarding how (or to what extent) music perception utilizes the neural circuitry that is engaged in speech processing, particularly at the cortical level. Prominent models such as Patel’s Shared Syntactic Integration Resource Hypothesis (SSIRH) and Koelsch’s neurocognitive model of music perception suggest a high degree of overlap, particularly in the frontal lobe, but also perhaps more distinct representations in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  45.  5
    Design and Implementation of Decentralized Swarm Intelligence E-Commerce Model Based on Regional Chain and Edge Computing.Xiaofang Luo - 2021 - Complexity 2021:1-11.
    In this paper, we investigate the model of decentralized groupwise e-commerce through regional chains combined with edge computing algorithms and design and implement it. A blockchain-based architecture for remote sensing resource and service transactions is proposed. The architecture utilizes the characteristics of nontamperable and traceable data on the blockchain to solve the problem of mutual distrust between the transaction parties, uses MongoDB for data retrieval and filtering to solve the problem that it is difficult to query flexibly on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  9
    Big Data solutions on a small scale: Evaluating accessible high-performance computing for social research.Sawyer A. Bowman & Dhiraj Murthy - 2014 - Big Data and Society 1 (2).
    Though full of promise, Big Data research success is often contingent on access to the newest, most advanced, and often expensive hardware systems and the expertise needed to build and implement such systems. As a result, the accessibility of the growing number of Big Data-capable technology solutions has often been the preserve of business analytics. Pay as you store/process services like Amazon Web Services have opened up possibilities for smaller scale Big Data projects. There is high demand for this type (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  75
    Program Verification and Functioning of Operative Computing Revisited: How about Mathematics Engineering? [REVIEW]Uri Pincas - 2011 - Minds and Machines 21 (2):337-359.
    The issue of proper functioning of operative computing and the utility of program verification, both in general and of specific methods, has been discussed a lot. In many of those discussions, attempts have been made to take mathematics as a model of knowledge and certitude achieving, and accordingly infer about the suitable ways to handle computing. I shortly review three approaches to the subject, and then take a stance by considering social factors which affect the epistemic status (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Epri control and diagnostics program expert system applications for the nuclear utility industry.Joseph A. Naser & Bill K.-H. Sun - 1991 - Ai 1991 Frontiers in Innovative Computing for the Nuclear Industry Topical Meeting, Jackson Lake, Wy, Sept. 15-18, 1991 1.
     
    Export citation  
     
    Bookmark  
  49.  10
    The locus of legitimate interpretation in Big Data sciences: Lessons for computational social science from -omic biology and high-energy physics.Neil Stephens, Luis Reyes-Galindo, Jamie Lewis & Andrew Bartlett - 2018 - Big Data and Society 5 (1).
    This paper argues that analyses of the ways in which Big Data has been enacted in other academic disciplines can provide us with concepts that will help understand the application of Big Data to social questions. We use examples drawn from our Science and Technology Studies analyses of -omic biology and high energy physics to demonstrate the utility of three theoretical concepts: primary and secondary inscriptions, crafted and found data, and the locus of legitimate interpretation. These help us to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. Allan Gibbard and William L. Harper.of Expected Utility - 1978 - In A. Hooker, J. J. Leach & E. F. McClennen (eds.), Foundations and Applications of Decision Theory. D. Reidel. pp. 125.
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000