Results for 'defense computer program'

999 found
Order:
  1.  56
    A defense of ad blocking and consumer inattention.Alexander Zambrano & Caleb Pickard - 2018 - Ethics and Information Technology 20 (3):143-155.
    Ad blockers are a category of computer software program, typically run as web browser extensions, that allow users to selectively eliminate advertisements from the webpages they visit. Many people have alleged that using an ad blocker is morally problematic because it is bad for content providers and consumers, and it is morally akin to theft. We disagree. In this paper, we defend an independent argument for the conclusion that using an ad blocker is morally permissible. In doing so, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  15
    Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI.C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle & Jeffrey L. Jenkins - 2020 - Frontiers in Psychology 11.
    Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the repetition (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. The Embodied Approach of Cognition: A Defense.Joseph Ulric Neisser - 1997 - Dissertation, Duke University
    I argue in defense of a new research program in cognitive science, which I call the embodied approach. This approach holds that cognition must be understood as the situated activity of an animal in an environment. The embodied approach supplements orthodox cognitive science by embedding computational processes in their physiological, ecological, and cultural contexts. Barbara Von Eckardt holds that cognitive science is a single theoretical project unified under the banner of computationalism, which explains cognition as the processing of (...)
     
    Export citation  
     
    Bookmark  
  4.  30
    Radar, Modems, and Air Defense Systems: Noise as a Data Communication Problem in the 1950s.Shawn M. Bullock - 2016 - Perspectives on Science 24 (1):73-92.
    In the aftermath of World War II, the government of the United States provided considerable funding for military projects that promised to provide a technological edge during the nascent Cold War. The most famous example is likely the V-2 rocket-testing program that began in the late 1940s. The 67 rockets launched from White Sands developed a knowledge base that was critically important to the launch of the first U.S. satellite in 1958 and to the subsequent manned space program. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  5.  10
    Evolution of the display of high technologies and social networks in the «terminator» universe in 1984-2022.К. В Каспарян, М. В Рутковская & А. С Линец - 2023 - Philosophical Problems of IT and Cyberspace (PhilITandC) 2:33-52.
    The article is devoted to a comprehensive analysis of the transformation of the reflection of computer technologies and network resources in the Terminator cinematic and literary universe created by the American director J. Cameron in the mid 1980s and early 2020s. In this study the authors substantiate the relevance and scientific component of the problem under study. The paper considers the degree of importance of high technologies and social networks in modern public life. The article provides a justification for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  1
    Особенности отражения компьютерных технологий и социальных сетей в художественной литературе и фантастическом кинематографе в XIX – начале XX вв.К. В Каспарян & М. В Рутковская - 2022 - Философские Проблемы Информационных Технологий И Киберпространства 1:34-60.
    The article is devoted to understanding the specific features of the reflection of computer technologies and social networks in the works of science fiction writers and in films made as part of development of the fantasy genre. In their work, the authors give a brief description of the essential aspects of the functioning of computer technologies and social networks. The article examines the degree of significance of the above phenomena for the effective development and existence of human civilization (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  92
    Double vision: two questions about the neo-Fregean program.John MacFarlane - 2009 - Synthese 170 (3):443-456.
    Much of The Reason’s Proper Study is devoted to defending the claim that simply by stipulating an abstraction principle for the “number-of” functor, we can simultaneously fix a meaning for this functor and acquire epistemic entitlement to the stipulated principle. In this paper, I argue that the semantic and epistemological principles Hale and Wright offer in defense of this claim may be too strong for their purposes. For if these principles are correct, it is hard to see why they (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  8. Dancing with pixies: strong artificial intelligence and panpsychism.John Mark Bishop - 2002 - In John Mark Bishop & John Preston (eds.), Views Into the Chinese Room: New Essays on Searle and Artificial Intelligence. London: Oxford University Press. pp. 360-379.
    The argument presented in this paper is not a direct attack or defence of the Chinese Room Argument (CRA), but relates to the premise at its heart, that syntax is not sufficient for semantics, via the closely associated propositions that semantics is not intrinsic to syntax and that syntax is not intrinsic to physics. However, in contrast to the CRA’s critique of the link between syntax and semantics, this paper will explore the associated link between syntax and physics. The main (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Syntax, Semantics, and Computer Programs.William J. Rapaport - 2020 - Philosophy and Technology 33 (2):309-321.
    Turner argues that computer programs must have purposes, that implementation is not a kind of semantics, and that computers might need to understand what they do. I respectfully disagree: Computer programs need not have purposes, implementation is a kind of semantic interpretation, and neither human computers nor computing machines need to understand what they do.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  29
    Reconstructor: a computer program that uses three-valued logics to represent lack of information in empirical scientific contexts.Ariel Jonathan Roffé - 2020 - Journal of Applied Non-Classical Logics 30 (1):68-91.
    In this article, I develop three conceptual innovations within the area of formal metatheory, and present a computer program, called Reconstructor, that implements those developments. The first development consists in a methodology for testing formal reconstructions of scientific theories, which involves checking both whether translations of paradigmatically successful applications into models satisfy the formalisation of the laws, and also whether unsuccessful applications do not. I show how Reconstructor can help carry this out, since it allows the end-user to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11. No computer program required: Even pencil-and-paper argument mapping improves critical thinking skills.Mara Harrell - 2008 - Teaching Philosophy 31 (4):351-374.
    Argument-mapping software abounds, and one of the reasons is that using the software has been shown to teach/promote/improve critical thinking skills. These positive results are very encouraging, but they also raise the question of whether the computer tutorial environment is producing these results, or whether learning argument mapping, even with just paper and pencil, is sufficient. Based on the results of two empirical studies, I argue that the basic skill of being able to represent an argument diagrammatically plays an (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  12. Computer Programming and the Death of Constructivist Art.Richard Wright - 2009 - Philosophy of Mathematics Education Journal 24.
    No categories
     
    Export citation  
     
    Bookmark  
  13.  55
    Dismantling the Chinese Room with linguistic tools: a framework for elucidating concept-application disputes.Lawrence Lengbeyer - 2022 - AI and Society 37 (4):1625-1643.
    Imagine advanced computers that could, by virtue merely of being programmed in the right ways, act, react, communicate, and otherwise behave like humans. Might such computers be capable of understanding, thinking, believing, and the like? The framework developed in this paper for tackling challenging questions of concept application (in any realm of discourse) answers in the affirmative, contrary to Searle’s famous ‘Chinese Room’ thought experiment, which purports to prove that ascribing such mental processes to computers like these would be necessarily (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  26
    Should computer programs be owned?Deborah G. Johnson - 1985 - Metaphilosophy 16 (4):276-288.
  15.  10
    Computer Programming and Formal Systems.J. C. Shepherdson, P. Braffort & D. Hirschberg - 1965 - Philosophical Quarterly 15 (61):371.
  16.  8
    Backgammon computer program beats world champion.Hans J. Berliner - 1980 - Artificial Intelligence 14 (2):205-220.
  17.  63
    Computer Programs for Checking Mathematical Proofs.John Mccarthy - 1967 - Journal of Symbolic Logic 32 (4):523-523.
  18.  12
    Visual Computer Programming: Semiotic and Cognitive Aspects.Sanda Monica Tataram - 2001 - American Journal of Semiotics 17 (3):157-173.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  19.  17
    Can Students’ Computer Programming Learning Motivation and Effectiveness Be Enhanced by Learning Python Language? A Multi-Group Analysis.Hsiao-Chi Ling, Kuo-Lun Hsiao & Wen-Chiao Hsu - 2021 - Frontiers in Psychology 11.
    Python language has become the most popular computer language. Python is widely adopted in computer courses. However, Python language’s effects on the college and university students’ learning performance, motivations, computer programming self-efficacy, and maladaptive cognition have still not been widely examined. The main objective of this study is to explore the effects of learning Python on students’ programming learning. The junior students of two classes in a college are the research participants. One class was taught Java language (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  9
    Computing programs for generalized planning using a classical planner.Javier Segovia-Aguas, Sergio Jiménez & Anders Jonsson - 2019 - Artificial Intelligence 272 (C):52-85.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  22
    Should computer programs be ownable?David H. Carey - 1993 - Metaphilosophy 24 (1-2):76-84.
  22.  8
    Logic Programming: Proceedings of the Joint International Conference and Symposium on Logic Programming.Krzysztof R. Apt & Association for Logic Programming - 1992 - MIT Press (MA).
    The Joint International Conference on Logic Programming, sponsored by the Association for Logic Programming, is a major forum for presentations of research, applications, and implementations in this important area of computer science. Logic programming is one of the most promising steps toward declarative programming and forms the theoretical basis of the programming language Prolog and its various extensions. Logic programming is also fundamental to work in artificial intelligence, where it has been used for nonmonotonic and commonsense reasoning, expert systems (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  5
    Spatial temporal information systems: an ontological approach using STK.Linda M. McNeil - 2013 - Boca Raton: CRC Press. Edited by T. S. Kelso.
    Designed to be a high-level, approachable resource for engineers who need further insight into spatial temporal information systems from an ontological perspective, Spatial Temporal Information Systems: An Ontological Approach using STK® explains the dynamics of objects interaction from signal analysis to trajectory design, spatial modeling, and other spatial analytics by using STK®, which is a general-purpose modeling and analysis application for any type of space, defense, or intelligence system. Building a foundation to begin the study of spatial temporal information (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  17
    A computer program to generate parametric and nonparametric signal-detection parameters.Russel Boice & Rick M. Gardner - 1988 - Bulletin of the Psychonomic Society 26 (4):365-367.
  25.  19
    Computer programs to estimate overoptimism in measures of discrimination for predicting the risk of cardiovascular diseases.Haider R. Mannan & John J. McNeil - 2013 - Journal of Evaluation in Clinical Practice 19 (2):358-362.
  26.  13
    Artists, computer programs and performance.S. Godlovitch - 1990 - Australasian Journal of Philosophy 68 (3):301 – 312.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27. A computer program for determining matrix models of propositional calculi.R. T. Brady - 1976 - Logique Et Analyse 19 (74):233.
     
    Export citation  
     
    Bookmark  
  28.  16
    Students' Performances in Computer Programming of Higher Education for Sustainable Development: The Effects of a Peer-Evaluation System.Tsung-Chih Hsiao, Ya-Hsueh Chuang, Tzer-Long Chen, Chien-Yun Chang & Chih-Cheng Chen - 2022 - Frontiers in Psychology 13.
    Modern education attaches great importance to interdisciplinary skills, among which computational thinking is a core element, and heralds a new era. IT application has shaped education in the 21st century. Computational thinking has provided further impetus for building an all-encompassing social network and fostering a DIY culture enabled by digital technologies. One empirical study used four apps to test children's development in computational thinking and fluency. The article will help students overcome their fears of coding. Peer reviews provide students with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  7
    Setting-up early computer programs: D. H. Lehmer’s ENIAC computation.Maarten Bullynck & Liesbeth Mol - 2010 - Archive for Mathematical Logic 49 (2):123-146.
    A complete reconstruction of Lehmer’s ENIAC set-up for computing the exponents of p modulo two is given. This program served as an early test program for the ENIAC (1946). The reconstruction illustrates the difficulties of early programmers to find a way between a man operated and a machine operated computation. These difficulties concern both the content level (the algorithm) and the formal level (the logic of sequencing operations).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  30.  9
    Measuring power of algorithms, computer programs and information automata.Mark Semenovich Burgin (ed.) - 2010 - New York: Nova Science Publishers.
    Introduction -- Algorithms, programs, procedures, and abstract automata -- Functioning of algorithms and automata, computation, and operations with algorithms and automata -- Basic postulates and axioms for algorithms -- Power of algorithms and classes of algorithms: comparison and evaluation -- Computing, accepting, and deciding modes of algorithms and programs -- Problems that people solve and related properties of algorithms -- Boundaries for algorithms and computation -- Software and hardware verification and testing -- Conclusion.
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  19
    About the “Trinity Thesis” Regarding the Ontology of Computer Programs.Henri Stephanou - 2020 - Philosophy and Technology 33 (2):323-330.
    This review of Turner’s “Computational Artifacts” focuses on one of the key novelties of the book, namely the proposal to understand the nature of computer programs as a “trinity” of specification, symbolic program, and physical process, replacing the traditional dualist views of programs as functional/structural or as symbolic/physical. This trinitarian view is found to be robust and helpful to solve typical issues of dualist views. Drawing comparisons with Simon’s view of the artifact as an interface, the author suggests (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  23
    Axiomatising the Logic of Computer Programming.Robert Goldblatt - 1985 - Journal of Symbolic Logic 50 (3):854-855.
  33.  47
    Setting-up early computer programs: D. H. Lehmer’s ENIAC computation. [REVIEW]Maarten Bullynck & Liesbeth De Mol - 2010 - Archive for Mathematical Logic 49 (2):123-146.
    A complete reconstruction of Lehmer’s ENIAC set-up for computing the exponents of p modulo two is given. This program served as an early test program for the ENIAC (1946). The reconstruction illustrates the difficulties of early programmers to find a way between a man operated and a machine operated computation. These difficulties concern both the content level (the algorithm) and the formal level (the logic of sequencing operations).
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Some empirical criteria for attributing creativity to a computer program.Graeme Ritchie - 2007 - Minds and Machines 17 (1):67-99.
    Over recent decades there has been a growing interest in the question of whether computer programs are capable of genuinely creative activity. Although this notion can be explored as a purely philosophical debate, an alternative perspective is to consider what aspects of the behaviour of a program might be noted or measured in order to arrive at an empirically supported judgement that creativity has occurred. We sketch out, in general abstract terms, what goes on when a potentially creative (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  35.  43
    The Strategic Computing Program at four years: Implications and intimations. [REVIEW]Chris Hables Gray - 1988 - AI and Society 2 (2):141-149.
    Examining the Strategic Computing Program after four years, in the context of the crucial recognition that it is only a small part of the whole range of military artificial intelligence applications, suggests a number of clear implications and intimations about such crucial questions as: 1) the current roles of industry and the universities in developing high technology war; 2) the effects on political and military policy of high-tech weapons systems; and 3) the importance of advanced military computing to subtle (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  21
    The Canadian Defense Ethics Program and the “Corporate Model”.Denis Beauchamp - 1998 - Business and Society Review 100-100 (1):71-74.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37. A digital-computer programming invariance.Walter A. Sturm - 1968 - In Peter Koestenbaum (ed.), Proceedings. [San Jose? Calif.,: [San Jose? Calif.. pp. 120.
     
    Export citation  
     
    Bookmark  
  38.  4
    Logic Programming and Non-monotonic Reasoning: Proceedings of the First International Workshop.Wiktor Marek, Anil Nerode, V. S. Subrahmanian & Association for Logic Programming - 1991 - MIT Press (MA).
    The First International Workshop brings together researchers from the theoretical ends of the logic programming and artificial intelligence communities to discuss their mutual interests. Logic programming deals with the use of models of mathematical logic as a way of programming computers, where theoretical AI deals with abstract issues in modeling and representing human knowledge and beliefs. One common ground is nonmonotonic reasoning, a family of logics that includes room for the kinds of variations that can be found in human reasoning. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  6
    Do Flipped Learning and Adaptive Instruction Improve Student Learning Outcome? A Case Study of a Computer Programming Course in Taiwan.Hong-Ren Chen & Wen-Chiao Hsu - 2022 - Frontiers in Psychology 12.
    Flipped learning could improve the learning effectiveness of students. However, some studies have pointed out the limitations related to flipped classrooms because the content of the flipped course does not vary according to the needs of the students. On the other hand, adaptive teaching, which customizes the learning mode according to the individual needs of students, can make up for some of the shortcomings of flipped teaching. This study combines adaptive teaching with flipped teaching and applies it to face-to-face classroom (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  16
    A truly human interface: interacting face-to-face with someone whose words are determined by a computer program.Kevin Corti & Alex Gillespie - 2015 - Frontiers in Psychology 6:145265.
    We use speech shadowing to create situations wherein people converse in person with a human whose words are determined by a conversational agent computer program. Speech shadowing involves a person (the shadower) repeating vocal stimuli originating from a separate communication source in real-time. Humans shadowing for conversational agent sources (e.g., chat bots) become hybrid agents ("echoborgs") capable of face-to-face interlocution. We report three studies that investigated people’s experiences interacting with echoborgs and the extent to which echoborgs pass as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  23
    Proof theory and computer programming.Ruy J. G. B. de Queiroz & Thomas S. E. Maibaum - 1990 - Mathematical Logic Quarterly 36 (5):389-414.
  42.  34
    Proof theory and computer programming.Ruy J. G. B. de Queiroz & Thomas S. E. Maibaum - 1990 - Zeitschrift fur mathematische Logik und Grundlagen der Mathematik 36 (5):389-414.
  43.  27
    A rhythm recognition computer program to advocate interactivist perception.Jean-Christophe Buisson - 2004 - Cognitive Science 28 (1):75-88.
    This paper advocates the main ideas of the interactive model of representation of Mark Bickhard and the assimilation/accommodation framework of Jean Piaget, through a rhythm recognition demonstration program. Although completely unsupervised, the program progressively learns to recognize more and more complex rhythms struck on the user's keyboard. It does so without any recording of the input flow, and without any pattern matching in the usual sense. On the contrary, internal processes are dynamically constructed to follow and anticipate the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  12
    Proof theory and computer programming.Ruy J. B. de Queiroz & Thomas Maibaum - 1990 - Mathematical Logic Quarterly 36 (5):389-414.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  28
    Language processing and computer programs.R. J. Harvey - 1986 - Behavioral and Brain Sciences 9 (3):549-550.
  46.  14
    A Reply to “Should Computer Programs Be Ownable?”.Deborah G. Johnson - 1993 - Metaphilosophy 24 (1-2):85-90.
  47.  5
    A Reply to “Should Computer Programs Be Ownable?”.Deborah G. Johnson - 1993 - Metaphilosophy 24 (1-2):85-90.
  48.  18
    COMET: A Computer Program dealing with Consent to Medical Treatment.Archie Duncan - 1988 - Journal of Medical Ethics 14 (4):212-213.
  49.  60
    Whiteheadian Philosophy and Prolog Computer Programming.Granville C. Henry & Michael G. Geertsen - 1986 - Process Studies 15 (3):181-191.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50.  8
    Structure and interpretation of computer programs.Kenneth D. Forbus - 1985 - Artificial Intelligence 27 (1):124-127.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999