Results for 'associative addressing in computers'

991 found
Order:
  1.  8
    Computer Science Logic: 11th International Workshop, CSL'97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers.M. Nielsen, Wolfgang Thomas & European Association for Computer Science Logic - 1998 - Springer Verlag.
    This book constitutes the strictly refereed post-workshop proceedings of the 11th International Workshop on Computer Science Logic, CSL '97, held as the 1997 Annual Conference of the European Association on Computer Science Logic, EACSL, in Aarhus, Denmark, in August 1997. The volume presents 26 revised full papers selected after two rounds of refereeing from initially 92 submissions; also included are four invited papers. The book addresses all current aspects of computer science logics and its applications and thus presents the state (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  7
    ALPUK91: Proceedings of the 3rd UK Annual Conference on Logic Programming, Edinburgh, 10–12 April 1991.Tim Duncan, C. S. Mellish, Geraint A. Wiggins & British Computer Society - 1992 - Springer.
    Since its conception nearly 20 years ago, Logic Programming - the idea of using logic as a programming language - has been developed to the point where it now plays an important role in areas such as database theory, artificial intelligence and software engineering. However, there are still many challenging research issues to be addressed and the UK branch of the Association for Logic Programming was set up to provide a forum where the flourishing research community could discuss important issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  8
    Logic Programming: Proceedings of the Joint International Conference and Symposium on Logic Programming.Krzysztof R. Apt & Association for Logic Programming - 1992 - MIT Press (MA).
    The Joint International Conference on Logic Programming, sponsored by the Association for Logic Programming, is a major forum for presentations of research, applications, and implementations in this important area of computer science. Logic programming is one of the most promising steps toward declarative programming and forms the theoretical basis of the programming language Prolog and its various extensions. Logic programming is also fundamental to work in artificial intelligence, where it has been used for nonmonotonic and commonsense reasoning, expert systems implementation, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Computer Simulations, Machine Learning and the Laplacean Demon: Opacity in the Case of High Energy Physics.Florian J. Boge & Paul Grünke - forthcoming - In Andreas Kaminski, Michael Resch & Petra Gehring (eds.), The Science and Art of Simulation II.
    In this paper, we pursue three general aims: (I) We will define a notion of fundamental opacity and ask whether it can be found in High Energy Physics (HEP), given the involvement of machine learning (ML) and computer simulations (CS) therein. (II) We identify two kinds of non-fundamental, contingent opacity associated with CS and ML in HEP respectively, and ask whether, and if so how, they may be overcome. (III) We address the question of whether any kind of opacity, contingent (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  8
    An Assessment of Research-Doctorate Programs in the United States: Mathematical and Physical Sciences.Lyle V. Jones, Gardner Lindzey, Porter E. Coggeshall & Conference Board of the Associated Research Councils - 1982 - National Academies Press.
    The quality of doctoral-level chemistry (N=145), computer science (N=58), geoscience (N=91), mathematics (N=115), physics (N=123), and statistics/biostatistics (N=64) programs at United States universities was assessed, using 16 measures. These measures focused on variables related to: program size; characteristics of graduates; reputational factors (scholarly quality of faculty, effectiveness of programs in educating research scholars/scientists, improvement in program quality during the last 5 years); university library size; research support; and publication records. Chapter I discusses prior attempts to assess quality in graduate education, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  24
    Computational modelling of protein interactions: Energy minimization for the refinement and scoring of association decoys.Alexander Dibrov, Yvonne Myal & Etienne Leygue - 2009 - Acta Biotheoretica 57 (4):419-428.
    The prediction of protein–protein interactions based on independently obtained structural information for each interacting partner remains an important challenge in computational chemistry. Procedures where hypothetical interaction models (or decoys) are generated, then ranked using a biochemically relevant scoring function have been garnering interest as an avenue for addressing such challenges. The program PatchDock has been shown to produce reasonable decoys for modeling the association between pig alpha-amylase and the VH-domains of camelide antibody raised against it. We designed a biochemically (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. Email and ethics : style and ethical relations in computer-mediated communication.Emma Rooksby - 2007 - In Michael Beaney (ed.), The Analytic Turn: Analysis in Early Analytic Philosophy and Phenomenology. Routledge.
    E-mail and Ethics explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
     
    Export citation  
     
    Bookmark   1 citation  
  8. Email and Ethics: Style and Ethical Relations in Computer-Mediated Communications.Emma Rooksby - 2002 - Routledge.
    _E-mail and Ethics_ explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  9.  5
    Email and Ethics: Style and Ethical Relations in Computer-Mediated Communications.Emma Rooksby - 2002 - Routledge.
    _E-mail and Ethics_ explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Ethical Challenges Associated with the Development and Deployment of Brain Computer Interface Technology.Paul McCullagh, Gaye Lightbody, Jaroslaw Zygierewicz & W. George Kernohan - 2013 - Neuroethics 7 (2):109-122.
    Brain Computer Interface (BCI) technology offers potential for human augmentation in areas ranging from communication to home automation, leisure and gaming. This paper addresses ethical challenges associated with the wider scale deployment of BCI as an assistive technology by documenting issues associated with the development of non-invasive BCI technology. Laboratory testing is normally carried out with volunteers but further testing with subjects, who may be in vulnerable groups is often needed to improve system operation. BCI development is technically complex, sometimes (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  11.  6
    Computing and Philosophy in Asia.Soraj Hongladarom (ed.) - 2007 - Cambridge Scholars Press.
    This volume is a collection of selected papers presented at the Second Asia-Pacific Computing and Philsosophy Conference, which was held in Bangkok, Thailand in January 2005. The conference was organized by the Center for Ethics of Science and Technology, Chulalongkorn University on behalf of the International Association of Computing and Philosophy (www.ia-cap.org). Computing have had a long relationship with philosophy, starting from the problem of how symbols being manipulated in computing bear a relation to the outside world, to those of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  4
    Logic Programming and Non-monotonic Reasoning: Proceedings of the First International Workshop.Wiktor Marek, Anil Nerode, V. S. Subrahmanian & Association for Logic Programming - 1991 - MIT Press (MA).
    The First International Workshop brings together researchers from the theoretical ends of the logic programming and artificial intelligence communities to discuss their mutual interests. Logic programming deals with the use of models of mathematical logic as a way of programming computers, where theoretical AI deals with abstract issues in modeling and representing human knowledge and beliefs. One common ground is nonmonotonic reasoning, a family of logics that includes room for the kinds of variations that can be found in human (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  48
    Challenges in developing computational models of emotion and consciousness.Eva Hudlicka - 2009 - International Journal of Machine Consciousness 1 (1):131-153.
    There is a long-standing debate regarding the nature of the relationship between emotions and consciousness. Majority of existing computational models of emotions largely avoid the issue, and generally do not explicitly address distinctions between the conscious and the unconscious components of emotions. This paper highlights the importance of developing an adequately differentiated vocabulary describing the mental states of interest, and their features and components, for the development of computational models of the relationships between emotions and consciousness. We discuss current psychological (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Explanation in Computational Neuroscience: Causal and Non-causal.M. Chirimuuta - 2018 - British Journal for the Philosophy of Science 69 (3):849-880.
    This article examines three candidate cases of non-causal explanation in computational neuroscience. I argue that there are instances of efficient coding explanation that are strongly analogous to examples of non-causal explanation in physics and biology, as presented by Batterman, Woodward, and Lange. By integrating Lange’s and Woodward’s accounts, I offer a new way to elucidate the distinction between causal and non-causal explanation, and to address concerns about the explanatory sufficiency of non-mechanistic models in neuroscience. I also use this framework to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  15.  22
    A Computational Model of Early Argument Structure Acquisition.Afra Alishahi & Suzanne Stevenson - 2008 - Cognitive Science 32 (5):789-834.
    How children go about learning the general regularities that govern language, as well as keeping track of the exceptions to them, remains one of the challenging open questions in the cognitive science of language. Computational modeling is an important methodology in research aimed at addressing this issue. We must determine appropriate learning mechanisms that can grasp generalizations from examples of specific usages, and that exhibit patterns of behavior over the course of learning similar to those in children. Early learning (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  16.  16
    Structural Equation Modeling of Vocabulary Size and Depth Using Conventional and Bayesian Methods.Rie Koizumi & Yo In’Nami - 2020 - Frontiers in Psychology 11.
    In classifications of vocabulary knowledge, vocabulary size and depth have often been separately conceptualized (Schmitt, 2014). Although size and depth are known to be substantially correlated, it is not clear whether they are a single construct or two separate components of vocabulary knowledge (Yanagisawa & Webb, 2020). This issue has not been addressed extensively in the literature and can be better examined using structural equation modeling (SEM), with measurement error modeled separately from the construct of interest. The current study reports (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. Association Address: Justice in the International Order.Charles Malik - 1962 - Proceedings and Addresses of the American Philosophical Association 36:1.
  18.  34
    Intuition, Computation, and Information.Ken Herold - 2014 - Minds and Machines 24 (1):85-88.
    Bynum (Putting information first: Luciano Floridi and the philosophy of information. NY: Wiley-Blackwell, 2010) identifies Floridi’s focus in the philosophy of information (PI) on entities both as data structures and as information objects. One suggestion for examining the association between the former and the latter stems from Floridi’s Herbert A. Simon Lecture in Computing and Philosophy given at Carnegie Mellon University in 2001, open problems in the PI: the transduction or transception, and how we gain knowledge about the world as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  19.  17
    Exploring the Computational Explanatory Gap.James A. Reggia, Di-Wei Huang & Garrett Katz - 2017 - Philosophies 2 (1):5.
    While substantial progress has been made in the field known as artificial consciousness, at the present time there is no generally accepted phenomenally conscious machine, nor even a clear route to how one might be produced should we decide to try. Here, we take the position that, from our computer science perspective, a major reason for this is a computational explanatory gap: our inability to understand/explain the implementation of high-level cognitive algorithms in terms of neurocomputational processing. We explain how (...) the computational explanatory gap can identify computational correlates of consciousness. We suggest that bridging this gap is not only critical to further progress in the area of machine consciousness, but would also inform the search for neurobiological correlates of consciousness and would, with high probability, contribute to demystifying the “hard problem” of understanding the mind–brain relationship. We compile a listing of previously proposed computational correlates of consciousness and, based on the results of recent computational modeling, suggest that the gating mechanisms associated with top-down cognitive control of working memory should be added to this list. We conclude that developing neurocognitive architectures that contribute to bridging the computational explanatory gap provides a credible and achievable roadmap to understanding the ultimate prospects for a conscious machine, and to a better understanding of the mind–brain problem in general. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. European Computing and Philosophy.Gordana Dodig-Crnkovic - 2009 - The Reasoner 3 (9):18-19.
    European Computing and Philosophy conference, 2–4 July Barcelona The Seventh ECAP (European Computing and Philosophy) conference was organized by Jordi Vallverdu at Autonomous University of Barcelona. The conference started with the IACAP (The International Association for CAP) presidential address by Luciano Floridi, focusing on mechanisms of knowledge production in informational networks. The first keynote delivered by Klaus Mainzer made a frame for the rest of the conference, by elucidating the fundamental role of complexity of informational structures that can be analyzed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  27
    Computer ethics for the computer professional from an Islamic point of view.Mansoor Al-A'ali - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):28-45.
    PurposeThe purpose of this paper is to study the ethical behaviour of Muslim IT professionals in an attempt to stop many unethical practices such as software piracy, software intellectual property violations and general software development.Design/methodology/approachThis study examines the computer ethical principles presented in the Association for Computing Machinery code of conduct from an Islamic point of view through studying some relevant verses of The Holy Quran and Hadiths of Prophet Mohammed. An evaluation of the benefits of this newly proposed Islamic (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  5
    The case for a broader approach to AI assurance: addressing “hidden” harms in the development of artificial intelligence.Christopher Thomas, Huw Roberts, Jakob Mökander, Andreas Tsamados, Mariarosaria Taddeo & Luciano Floridi - forthcoming - AI and Society:1-16.
    Artificial intelligence (AI) assurance is an umbrella term describing many approaches—such as impact assessment, audit, and certification procedures—used to provide evidence that an AI system is legal, ethical, and technically robust. AI assurance approaches largely focus on two overlapping categories of harms: deployment harms that emerge at, or after, the point of use, and individual harms that directly impact a person as an individual. Current approaches generally overlook upstream collective and societal harms associated with the development of systems, such as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. Proceedings of the 26th Annual Meeting of the Association for Computational Linguistics (SUNY Buffalo).Janyce M. Wiebe & William J. Rapaport (eds.) - 1988 - Assoc for computational linguistics.
    Narrative passages told from a character's perspective convey the character's thoughts and perceptions. We present a discourse process that recognizes characters' thoughts and perceptions in third-person narrative. An effect of perspective on reference In narrative is addressed: references in passages told from the perspective of a character reflect the character's beliefs. An algorithm that uses the results of our discourse process to understand references with respect to an appropriate set of beliefs is presented.
    Direct download  
     
    Export citation  
     
    Bookmark  
  24. AI*IA 2017 Advances in Artificial Intelligence - XVIth International Conference of the Italian Association for Artificial Intelligence, Bari, Italy, November 14-17, 2017, Proceedings. Lecture Notes in Computer Science 10640.Daniele Porello & Giancarlo Guizzardi (eds.) - 2017
    No categories
     
    Export citation  
     
    Bookmark  
  25. Is the brain a digital computer?John R. Searle - 1990 - Proceedings and Addresses of the American Philosophical Association 64 (3):21-37.
    There are different ways to present a Presidential Address to the APA; the one I have chosen is simply to report on work that I am doing right now, on work in progress. I am going to present some of my further explorations into the computational model of the mind.\**.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   112 citations  
  26.  2
    Towards Transnational Fairness in Machine Learning: A Case Study in Disaster Response Systems.Cem Kozcuer, Anne Mollen & Felix Bießmann - 2024 - Minds and Machines 34 (2):1-26.
    Research on fairness in machine learning (ML) has been largely focusing on individual and group fairness. With the adoption of ML-based technologies as assistive technology in complex societal transformations or crisis situations on a global scale these existing definitions fail to account for algorithmic fairness transnationally. We propose to complement existing perspectives on algorithmic fairness with a notion of transnational algorithmic fairness and take first steps towards an analytical framework. We exemplify the relevance of a transnational fairness assessment in a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  68
    Perspectives on computing ethics: a multi-stakeholder analysis.Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony & Dympna O’Sullivan - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):72-90.
    Purpose Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28. Time phases, pointers, rules and embedding.John A. Barnden - 1993 - Behavioral and Brain Sciences 16 (3):451-452.
    This paper is a commentary on the target article by Lokendra Shastri & Venkat Ajjanagadde [S&A]: “From simple associations to systematic reasoning: A connectionist representation of rules, variables and dynamic bindings using temporal synchrony” in same issue of the journal, pp.417–451. -/- It puts S&A's temporal-synchrony binding method in a broader context, comments on notions of pointing and other ways of associating information - in both computers and connectionist systems - and mentions types of reasoning that are a challenge (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29.  17
    Ability, Breadth, and Parsimony in Computational Models of Higher‐Order Cognition.Nicholas L. Cassimatis, Paul Bello & Pat Langley - 2008 - Cognitive Science 32 (8):1304-1322.
    Computational models will play an important role in our understanding of human higher‐order cognition. How can a model's contribution to this goal be evaluated? This article argues that three important aspects of a model of higher‐order cognition to evaluate are (a) its ability to reason, solve problems, converse, and learn as well as people do; (b) the breadth of situations in which it can do so; and (c) the parsimony of the mechanisms it posits. This article argues that fits of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  30. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in detail the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  51
    Creativity in Computer Science.Daniel Saunders & Paul Thagard - unknown
    Computer science only became established as a field in the 1950s, growing out of theoretical and practical research begun in the previous two decades. The field has exhibited immense creativity, ranging from innovative hardware such as the early mainframes to software breakthroughs such as programming languages and the Internet. Martin Gardner worried that "it would be a sad day if human beings, adjusting to the Computer Revolution, became so intellectually lazy that they lost their power of creative thinking" (Gardner, 1978, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. From simple associations to systematic reasoning: A connectionist representation of rules, variables, and dynamic binding using temporal synchrony.Lokendra Shastri & Venkat Ajjanagadde - 1993 - Behavioral and Brain Sciences 16 (3):417-51.
    Human agents draw a variety of inferences effortlessly, spontaneously, and with remarkable efficiency – as though these inferences were a reflexive response of their cognitive apparatus. Furthermore, these inferences are drawn with reference to a large body of background knowledge. This remarkable human ability seems paradoxical given the complexity of reasoning reported by researchers in artificial intelligence. It also poses a challenge for cognitive science and computational neuroscience: How can a system of simple and slow neuronlike elements represent a large (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   122 citations  
  33.  18
    Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns.Radhakrishna Vangipuram, P. V. Kumar, Vinjamuri Janaki, Shadi A. Aljawarneh, Juan A. Lara & Khalaf Khatatneh - 2020 - Foundations of Science 25 (4):1027-1048.
    Similarity profiled association mining from time stamped transaction databases is an important topic of research relatively less addressed in the field of temporal data mining. Mining temporal patterns from these time series databases requires choosing and applying similarity measure for similarity computations and subsequently pruning temporal patterns. This research proposes a novel z-space based interest measure named as Krishna Sudarsana for time-stamped transaction databases by extending interest measure Srihass proposed in previous research. Krishna Sudarsana is designed by using the product (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  7
    Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors.Jin Ree Lee & Thomas J. Holt - 2020 - Frontiers in Psychology 11.
    Research on delinquency reduction often highlights the importance of identifying and sanctioning antisocial and illegal activities so as to reduce the likelihood of future offending. The rise of digital technology complicates the process of detecting cybercrimes and technology enabled offenses, as individuals can use devices from anywhere to engage in various harmful activities that may appear benign to an observer. Despite the growth of cybercrime research, limited studies have examined the extent to which technology enabled offenses are detected, or the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Enactive autonomy in computational systems.Mario Villalobos & Joe Dewhurst - 2018 - Synthese 195 (5):1891-1908.
    In this paper we will demonstrate that a computational system can meet the criteria for autonomy laid down by classical enactivism. The two criteria that we will focus on are operational closure and structural determinism, and we will show that both can be applied to a basic example of a physically instantiated Turing machine. We will also address the question of precariousness, and briefly suggest that a precarious Turing machine could be designed. Our aim in this paper is to challenge (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  36. Recent Developments in Computing and Philosophy.Anthony F. Beavers - 2011 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 42 (2):385-397.
    Because the label "computing and philosophy" can seem like an ad hoc attempt to tie computing to philosophy, it is important to explain why it is not, what it studies (or does) and how it differs from research in, say, "computing and history," or "computing and biology". The American Association for History and Computing is "dedicated to the reasonable and productive marriage of history and computer technology for teaching, researching and representing history through scholarship and public history" (http://theaahc.org). More pervasive, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  37.  19
    Hector freytes, Antonio ledda, Giuseppe sergioli and.Roberto Giuntini & Probabilistic Logics in Quantum Computation - 2013 - In Hanne Andersen, Dennis Dieks, Wenceslao González, Thomas Uebel & Gregory Wheeler (eds.), New Challenges to Philosophy of Science. Springer Verlag. pp. 49.
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  1
    Developments in Clinical and Experimental Neuropsychology.John R. Crawford & Denis M. Parker (eds.) - 1989 - Springer.
    The chapters published in this volume developed from presentations, and their associated discussions at a conference organised by the Scottish Branch of the British Psychological Society, held at Rothesay, Isle of Bute, Scotland in September 1987. The goal of the conference was to bring together workers across a wide area of neuropsychological research to discuss recent technological advances, developments in assessment and rehabilitation, and to address theoretical issues of current interest. Thus, the chapters in this book include contributions on the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  60
    Wilfried Buchholz. Notation systems for infinitary derivations_. Archive for mathematical logic, vol. 30 no. 5–6 (1991), pp. 277–296. - Wilfried Buchholz. _Explaining Gentzen's consistency proof within infinitary proof theory_. Computational logic and proof theory, 5th Kurt Gödel colloquium, KGC '97, Vienna, Austria, August 25–29, 1997, Proceedings, edited by Georg Gottlob, Alexander Leitsch, and Daniele Mundici, Lecture notes in computer science, vol. 1289, Springer, Berlin, Heidelberg, New York, etc., 1997, pp. 4–17. - Sergei Tupailo. _Finitary reductions for local predicativity, I: recursively regular ordinals. Logic Colloquium '98, Proceedings of the annual European summer meeting of the Association for Symbolic Logic, held in Prague, Czech Republic, August 9–15, 1998, edited by Samuel R. Buss, Petr Háajek, and Pavel Pudlák, Lecture notes in logic, no. 13, Association for Symbolic Logic, Urbana, and A K Peters, Natick, Mass., etc., 2000, pp. 465–499. [REVIEW]Toshiyasu Arai - 2002 - Bulletin of Symbolic Logic 8 (3):437-439.
  40.  61
    Speech Acts in a Dialogue Game Formalisation of Critical Discussion.Jacky Visser - 2017 - Argumentation 31 (2):245-266.
    In this paper a dialogue game for critical discussion is developed. The dialogue game is a formalisation of the ideal discussion model that is central to the pragma-dialectical theory of argumentation. The formalisation is intended as a preparatory step to facilitate the development of computational tools to support the pragma-dialectical study of argumentation. An important dimension of the pragma-dialectical discussion model is the role played by speech acts. The central issue addressed in this paper is how the speech act perspective (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  13
    Big Data in Computational Social Science and Humanities.Shu-Heng Chen (ed.) - 2018 - Springer Verlag.
    This edited volume focuses on big data implications for computational social science and humanities from management to usage. The first part of the book covers geographic data, text corpus data, and social media data, and exemplifies their concrete applications in a wide range of fields including anthropology, economics, finance, geography, history, linguistics, political science, psychology, public health, and mass communications. The second part of the book provides a panoramic view of the development of big data in the fields of computational (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  10
    Philosophical presuppositions in ‘computational thinking’—old wine in new bottles?Nina Bonderup Dohn - forthcoming - Journal of Philosophy of Education.
    ‘Computational thinking’ (CT) is highlighted in research literature, societal debates, and educational policies alike as being of prime significance in the 21st century. It is currently being introduced into K–12 (primary and secondary education) curricula around the world. However, there is no consensus on what exactly CT consists of, which skills it involves, and how it relates to programming. This article pinpoints four competing claims as to what constitutes the defining traits of CT. For each of the four claims, inherent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  20
    Engagement, Persistence, and Gender in Computer Science: Results of a Smartphone ESM Study.Carolina Milesi, Lara Perez-Felkner, Kevin Brown & Barbara Schneider - 2017 - Frontiers in Psychology 8:251745.
    While the underrepresentation of women in the fast-growing STEM field of computer science (CS) has been much studied, no consensus exists on the key factors influencing this widening gender gap. Possible suspects include gender differences in aptitude, interest, and academic environment. Our study contributes to this literature by applying student engagement research to study the experiences of college students studying CS, to assess the degree to which differences in men and women’s engagement may help account for gender inequity in the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  44.  53
    Argument Schemes in Computer System Safety Engineering.Tangming Yuan & Tim Kelly - 2011 - Informal Logic 31 (2):89-109.
    Safe Safety arguments are key components in a safety case. Too often, safety arguments are constructed without proper reasoning. To address this, we argue that informal logic argument schemes have important roles to play in safety argument construction and reviewing process. Ten commonly used reasoning schemes in computer system safety domain are proposed. The role of informal logic dialogue games in computer system safety arguments reviewing is also discussed and the intended work in this area is proposed. It is anticipated (...)
    Direct download (15 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  18
    Assessing students' ethical development in computing with the defining issues test.Suzy Jagger & John Strain - 2007 - Journal of Information, Communication and Ethics in Society 5 (1):33-42.
    PurposeThe purpose of this research paper is to examine the early stages of a research project aimed at evaluating the pedagogic effectiveness of a teaching module in computing ethics.Design/methodology/approachScores of students' cognitive capabilities to make moral judgements were measured before and after they had taken the module by means of the “Defining Issues Test”. This is a standard test of students' capability to make moral judgement based on the work of Lawrence Kohlberg. Interviews were then used to help understand the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  10
    Stable Anatomy Detection in Multimodal Imaging Through Sparse Group Regularization: A Comparative Study of Iron Accumulation in the Aging Brain.Matthew Pietrosanu, Li Zhang, Peter Seres, Ahmed Elkady, Alan H. Wilman, Linglong Kong & Dana Cobzas - 2021 - Frontiers in Human Neuroscience 15.
    Multimodal neuroimaging provides a rich source of data for identifying brain regions associated with disease progression and aging. However, present studies still typically analyze modalities separately or aggregate voxel-wise measurements and analyses to the structural level, thus reducing statistical power. As a central example, previous works have used two quantitative MRI parameters—R2* and quantitative susceptibility —to study changes in iron associated with aging in healthy and multiple sclerosis subjects, but failed to simultaneously account for both. In this article, we propose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  58
    Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  48.  12
    A data-driven machine learning approach for brain-computer interfaces targeting lower limb neuroprosthetics.Arnau Dillen, Elke Lathouwers, Aleksandar Miladinović, Uros Marusic, Fakhredinne Ghaffari, Olivier Romain, Romain Meeusen & Kevin De Pauw - 2022 - Frontiers in Human Neuroscience 16.
    Prosthetic devices that replace a lost limb have become increasingly performant in recent years. Recent advances in both software and hardware allow for the decoding of electroencephalogram signals to improve the control of active prostheses with brain-computer interfaces. Most BCI research is focused on the upper body. Although BCI research for the lower extremities has increased in recent years, there are still gaps in our knowledge of the neural patterns associated with lower limb movement. Therefore, the main objective of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  8
    A data-driven machine learning approach for brain-computer interfaces targeting lower limb neuroprosthetics.Arnau Dillen, Elke Lathouwers, Aleksandar Miladinović, Uros Marusic, Fakhreddine Ghaffari, Olivier Romain, Romain Meeusen & Kevin De Pauw - 2022 - Frontiers in Human Neuroscience 16.
    Prosthetic devices that replace a lost limb have become increasingly performant in recent years. Recent advances in both software and hardware allow for the decoding of electroencephalogram signals to improve the control of active prostheses with brain-computer interfaces. Most BCI research is focused on the upper body. Although BCI research for the lower extremities has increased in recent years, there are still gaps in our knowledge of the neural patterns associated with lower limb movement. Therefore, the main objective of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  19
    Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 991