Results for 'pervasive computing'

1000+ found
Order:
  1.  22
    Pervasive computing and an aging populace.Kalpana Shankar - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):236-248.
    PurposeThe purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy elderly.Design/methodology/approachThe paper is based on focus groups with 60 senior citizens either living independently or in an assisted living facility. Prototypes of home‐based ubiquitous computing devices were created and deployed in a home‐like living lab setting; elders were brought to the lab to interact with the prototypes, then brought together in focus groups (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  2.  61
    Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. HCI Model with Learning Mechanism for Cooperative Design in Pervasive Computing Environment.Hong Liu, Bin Hu & Philip Moore - 2015 - Journal of Internet Technology 16.
    This paper presents a human-computer interaction model with a three layers learning mechanism in a pervasive environment. We begin with a discussion around a number of important issues related to human-computer interaction followed by a description of the architecture for a multi-agent cooperative design system for pervasive computing environment. We present our proposed three- layer HCI model and introduce the group formation algorithm, which is predicated on a dynamic sharing niche technology. Finally, we explore the cooperative reinforcement (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  23
    Public involvement in technology policy: focus on the pervasive computing environment.Jenifer S. Winter - 2006 - Acm Sigcas Computers and Society 36 (3):49-57.
    This paper examines the role of the general public in informing technology policy, observing that public involvement often occurs only through the electoral process or via feedback after plans have been implemented. Planners and policymakers are not necessarily in touch with the feelings and desires of the public who will be affected by their decisions. For this reason it is important to seek a clearer understanding of the views of citizens who are not typically involved in the planning or design (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  27
    The semiotics of smart appliances and pervasive computing.Peter Bøgh Andersen & Martin Brynskov - 2007 - In R. Gudwin & J. Queiroz (eds.), Semiotics and Intelligent Systems Development. Idea Group.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  18
    Context-aware security management system for pervasive computing environment.Seon-Ho Park, Young-Ju Han & Tai-Myoung Chung - 2007 - In D. C. Richardson B. Kokinov (ed.), Modeling and Using Context. Springer. pp. 384--396.
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  72
    Mechanistic Computational Individuation without Biting the Bullet.Nir Fresco & Marcin Miłkowski - 2021 - British Journal for the Philosophy of Science 72 (2):431-438.
    Is the mathematical function being computed by a given physical system determined by the system’s dynamics? This question is at the heart of the indeterminacy of computation phenomenon (Fresco et al. [unpublished]). A paradigmatic example is a conventional electrical AND-gate that is often said to compute conjunction, but it can just as well be used to compute disjunction. Despite the pervasiveness of this phenomenon in physical computational systems, it has been discussed in the philosophical literature only indirectly, mostly with reference (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8. Mechanistic Computational Individuation without Biting the Bullet.Nir Fresco & Marcin Miłkowski - 2019 - British Journal for the Philosophy of Science:axz005.
    Is the mathematical function being computed by a given physical system determined by the system’s dynamics? This question is at the heart of the indeterminacy of computation phenomenon (Fresco et al. [unpublished]). A paradigmatic example is a conventional electrical AND-gate that is often said to compute conjunction, but it can just as well be used to compute disjunction. Despite the pervasiveness of this phenomenon in physical computational systems, it has been discussed in the philosophical literature only indirectly, mostly with reference (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  9.  6
    Computing and Philosophy in Asia.Soraj Hongladarom (ed.) - 2007 - Cambridge Scholars Press.
    This volume is a collection of selected papers presented at the Second Asia-Pacific Computing and Philsosophy Conference, which was held in Bangkok, Thailand in January 2005. The conference was organized by the Center for Ethics of Science and Technology, Chulalongkorn University on behalf of the International Association of Computing and Philosophy (www.ia-cap.org). Computing have had a long relationship with philosophy, starting from the problem of how symbols being manipulated in computing bear a relation to the outside (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  40
    The computational therapeutic: exploring Weizenbaum’s ELIZA as a history of the present.Caroline Bassett - 2019 - AI and Society 34 (4):803-812.
    This paper explores the history of ELIZA, a computer programme approximating a Rogerian therapist, developed by Jospeh Weizenbaum at MIT in the 1970s, as an early AI experiment. ELIZA’s reception provoked Weizenbaum to re-appraise the relationship between ‘computer power and human reason’ and to attack the ‘powerful delusional thinking’ about computers and their intelligence that he understood to be widespread in the general public and also amongst experts. The root issue for Weizenbaum was whether human thought could be ‘entirely computable’. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11.  7
    Everything is Animated: Pervasive Media and the Networked Subject.Beth Coleman - 2012 - Body and Society 18 (1):79-98.
    In a world of pervasive media and ubiquitous computing, this article asks what happens as everything (objects, subjects, and actions) moves toward animation across a network. How do media and mediation affect our sense of agency? I argue that the contemporary subject, as described by real-world media practice and animated film, exists within a space of accelerated mediation that distorts self-perception. I use the example of A Scanner Darkly, the 2006 Richard Linklater film, to discuss the effects of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  14
    The computational therapeutic: exploring Weizenbaum’s ELIZA as a history of the present.Caroline Bassett - 2018 - AI and Society 34 (4):803-812.
    This paper explores the history of ELIZA, a computer programme approximating a Rogerian therapist, developed by Jospeh Weizenbaum at MIT in the 1970s, as an early AI experiment. ELIZA’s reception provoked Weizenbaum to re-appraise the relationship between ‘computer power and human reason’ and to attack the ‘powerful delusional thinking’ about computers and their intelligence that he understood to be widespread in the general public and also amongst experts. The root issue for Weizenbaum was whether human thought could be ‘entirely computable’. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  24
    Urban-semantic computer vision: a framework for contextual understanding of people in urban spaces.Anthony Vanky & Ri Le - 2023 - AI and Society 38 (3):1193-1207.
    Increasing computational power and improving deep learning methods have made computer vision technologies pervasively common in urban environments. Their applications in policing, traffic management, and documenting public spaces are increasingly common (Ridgeway 2018, Coifman et al. 1998, Sun et al. 2020). Despite the often-discussed biases in the algorithms' training and unequally borne benefits (Khosla et al. 2012), almost all applications similarly reduce urban experiences to simplistic, reductive, and mechanistic measures. There is a lack of context, depth, and specificity in these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  10
    Philosophical presuppositions in ‘computational thinking’—old wine in new bottles?Nina Bonderup Dohn - forthcoming - Journal of Philosophy of Education.
    ‘Computational thinking’ (CT) is highlighted in research literature, societal debates, and educational policies alike as being of prime significance in the 21st century. It is currently being introduced into K–12 (primary and secondary education) curricula around the world. However, there is no consensus on what exactly CT consists of, which skills it involves, and how it relates to programming. This article pinpoints four competing claims as to what constitutes the defining traits of CT. For each of the four claims, inherent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  25
    Mapping an expanding territory: computer simulations in evolutionary biology.Philippe Huneman - 2014 - History and Philosophy of the Life Sciences 36 (1):60-89.
    The pervasive use of computer simulations in the sciences brings novel epistemological issues discussed in the philosophy of science literature since about a decade. Evolutionary biology strongly relies on such simulations, and in relation to it there exists a research program (Artificial Life) that mainly studies simulations themselves. This paper addresses the specificity of computer simulations in evolutionary biology, in the context (described in Sect. 1) of a set of questions about their scope as explanations, the nature of validation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Brain to computer communication: Ethical perspectives on interaction models. [REVIEW]Guglielmo Tamburrini - 2009 - Neuroethics 2 (3):137-149.
    Brain Computer Interfaces (BCIs) enable one to control peripheral ICT and robotic devices by processing brain activity on-line. The potential usefulness of BCI systems, initially demonstrated in rehabilitation medicine, is now being explored in education, entertainment, intensive workflow monitoring, security, and training. Ethical issues arising in connection with these investigations are triaged taking into account technological imminence and pervasiveness of BCI technologies. By focussing on imminent technological developments, ethical reflection is informatively grounded into realistic protocols of brain-to-computer communication. In particular, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  18.  44
    Computer ethics: Codes, commandments, and quandries.Julie Van Camp - manuscript
    Surprise – these much-publicized rules are not the least bit reassuring to people who specialize in the study of ethics. While attention to ethics is certainly welcome, these ethical codes provide a too-easy cop-out, a way to neatly dispose of attention to nagging and pervasive problems. The typical professional code is little more than a checklist of rules that enables professionals of any stripe to give lip service to ethical behavior without engaging in continuing dialogue on ethical dilemmas. Neatly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  38
    Towards a decolonial I in AI: mapping the pervasive effects of artificial intelligence on the art ecosystem.Amir Baradaran - forthcoming - AI and Society:1-13.
    This paper delves into the intricate relationship between Artificial Intelligence (AI) and the art ecosystem, emphasizing the need for a decolonizing approach in the face of AI's growing influence. It argues that the development of AI is not just a technological leap but also a significant cultural and societal moment, akin to the advent of moving images that Walter Benjamin famously analyzed. The paper examines how AI, particularly in its current oligarchical and corporate-driven form, perpetuates and magnifies the existing social (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. Recent Developments in Computing and Philosophy.Anthony F. Beavers - 2011 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 42 (2):385-397.
    Because the label "computing and philosophy" can seem like an ad hoc attempt to tie computing to philosophy, it is important to explain why it is not, what it studies (or does) and how it differs from research in, say, "computing and history," or "computing and biology". The American Association for History and Computing is "dedicated to the reasonable and productive marriage of history and computer technology for teaching, researching and representing history through scholarship and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  21.  4
    Feeling present in the physical world and in computer-mediated environments.John A. Waterworth - 2014 - New York: Palgrave-Macmillan. Edited by Giuseppe Riva.
    Our experience of the physical world around us, and of the social environments in which we function, is increasingly mediated by information and communication technology, which is itself evolving ever more rapidly and pervasively. This book presents a coherent and detailed account of why we experience feelings of being present in the physical world and in computer-mediated environments, why we often don't, and why it matters - for design, psychotherapy, tool use and social creativity amongst other practical applications. Since the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  7
    Probing Lexical Ambiguity in Chinese Characters via Their Word Formations: Convergence of Perceived and Computed Metrics.Tianqi Wang, Xu Xu, Xurong Xie & Manwa Lawrence Ng - 2023 - Cognitive Science 47 (11):e13379.
    Lexical ambiguity is pervasive in language, and the nature of the representations of an ambiguous word's multiple meanings is yet to be fully understood. With a special focus on Chinese characters, the present study first established that native speaker's perception about a character's number of meanings was heavily influenced by the availability of its distinct word formations, while whether these meanings would be perceived to be closely related was driven by further conceptual analysis. These notions were operationalized as two (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  56
    The Borg–eye and the We–I. The production of a collective living body through wearable computers.Nicola Liberati - 2020 - AI and Society 35 (1):39-49.
    The aim of this work is to analyze the constitution of a new collective subject thanks to wearable computers. Wearable computers are emerging technologies which are supposed to become pervasively used in the near future. They are devices designed to be on us every single moment of our life and to capture every experience we have. Therefore, we need to be prepared to such intrusive devices and to analyze potential effect they will have on us and our society. Thanks to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24.  18
    Design Issues in Ethical Agent Computing.L. Pretorius, A. Barnard & E. Cloete - 2004 - Acm Sigcas Computers and Society 34 (1):3.
    Agent computing, and in particular intelligent mobile agent computing, is at present awarded increasing prominence in the literature. This is partly due to the pervasive nature of available Internet technologies such as search engines and booking agents. It is within this context that the importance of investigating various characteristics demonstrated by mobile agent computing is becoming apparent. In order to perform specialized tasks on behalf of their owners, a certain amount of intelligence in mobile agents is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  25.  27
    Effects of Attention on the Strength of Lexical Influences on Speech Perception: Behavioral Experiments and Computational Mechanisms.Daniel Mirman, James L. McClelland, Lori L. Holt & James S. Magnuson - 2008 - Cognitive Science 32 (2):398-417.
    The effects of lexical context on phonological processing are pervasive and there have been indications that such effects may be modulated by attention. However, attentional modulation in speech processing is neither well documented nor well understood. Experiment 1 demonstrated attentional modulation of lexical facilitation of speech sound recognition when task and critical stimuli were identical across attention conditions. We propose modulation of lexical activation as a neurophysiologically plausible computational mechanism that can account for this type of modulation. Contrary to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  3
    Abstraction, Law, and Freedom in Computer Science.Timothy Colburn & Gary Shute - 2011-04-22 - In Armen T. Marsoobian, Brian J. Huschle, Eric Cavallero & Patrick Allo (eds.), Putting Information First. Wiley‐Blackwell. pp. 97–115.
    This chapter contains sections titled: Introduction Computer Science as the Master of Its Domain The Concept of Law in Computer Science Computer Science Laws as Invariants The Interplay of Freedom and Constraint Conclusion References.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. An Ontology-Based Approach to Metaphor Cognitive Computation.Xiaoxi Huang, Huaxin Huang, Beishui Liao & Cihua Xu - 2013 - Minds and Machines 23 (1):105-121.
    Language understanding is one of the most important characteristics for human beings. As a pervasive phenomenon in natural language, metaphor is not only an essential thinking approach, but also an ingredient in human conceptual system. Many of our ways of thinking and experiences are virtually represented metaphorically. With the development of the cognitive research on metaphor, it is urgent to formulate a computational model for metaphor understanding based on the cognitive mechanism, especially with the view to promoting natural language (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  71
    The role of metaethics and the future of computer ethics.Antonio Marturano - 2002 - Ethics and Information Technology 4 (1):71-78.
    In the following essay, I will discuss D.Johnson's argument in her ETHICOMP99 KeynoteSpeech (Johnson 1999) regarding the possiblefuture disappearance of computer ethics as anautonomous discipline, and I will analyze somelikely objections to Johnson's view.In the future, there are two ways in whichcomputer ethics might disappear: (1) therejection of computer ethics as an aspect ofapplied ethics, or (2) the rejection ofcomputer ethics as an autonomous discipline.The first path, it seems to me, would lead tothe death of the entire field of appliedethics, (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  17
    Locative media and data-driven computing experiments.Leighton Evans, Rob Kitchin & Sung-Yueh Perng - 2016 - Big Data and Society 3 (1).
    Over the past two decades urban social life has undergone a rapid and pervasive geocoding, becoming mediated, augmented and anticipated by location-sensitive technologies and services that generate and utilise big, personal, locative data. The production of these data has prompted the development of exploratory data-driven computing experiments that seek to find ways to extract value and insight from them. These projects often start from the data, rather than from a question or theory, and try to imagine and identify (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Randomness and Recursive Enumerability.Siam J. Comput - unknown
    One recursively enumerable real α dominates another one β if there are nondecreasing recursive sequences of rational numbers (a[n] : n ∈ ω) approximating α and (b[n] : n ∈ ω) approximating β and a positive constant C such that for all n, C(α − a[n]) ≥ (β − b[n]). See [R. M. Solovay, Draft of a Paper (or Series of Papers) on Chaitin’s Work, manuscript, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1974, p. 215] and [G. J. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. The fortieth annual lecture series 1999-2000.Brain Computations & an Inevitable Conflict - 2000 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 31:199-200.
  33.  19
    Hector freytes, Antonio ledda, Giuseppe sergioli and.Roberto Giuntini & Probabilistic Logics in Quantum Computation - 2013 - In Hanne Andersen, Dennis Dieks, Wenceslao González, Thomas Uebel & Gregory Wheeler (eds.), New Challenges to Philosophy of Science. Springer Verlag. pp. 49.
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Paul M. kjeldergaard.Pittsburgh Computations Centers - 1968 - In T. Dixon & Deryck Horton (eds.), Verbal Behavior and General Behavior Theory. Prentice-Hall.
    No categories
     
    Export citation  
     
    Bookmark  
  35. Section 2. Model Theory.Va Vardanyan, On Provability Resembling Computability, Proving Aa Voronkov & Constructive Logic - 1989 - In Jens Erik Fenstad, Ivan Timofeevich Frolov & Risto Hilpinen (eds.), Logic, Methodology, and Philosophy of Science Viii: Proceedings of the Eighth International Congress of Logic, Methodology, and Philosophy of Science, Moscow, 1987. Sole Distributors for the U.S.A. And Canada, Elsevier Science.
    No categories
     
    Export citation  
     
    Bookmark  
  36. The general problem of the primitive was finally solved in 1912 by A. Den-joy. But his integration process was more complicated than that of Lebesgue. Denjoy's basic idea was to first calculate the definite integral∫ b. [REVIEW]How to Compute Antiderivatives - 1995 - Bulletin of Symbolic Logic 1 (3).
     
    Export citation  
     
    Bookmark  
  37.  7
    ALPUK91: Proceedings of the 3rd UK Annual Conference on Logic Programming, Edinburgh, 10–12 April 1991.Tim Duncan, C. S. Mellish, Geraint A. Wiggins & British Computer Society - 1992 - Springer.
    Since its conception nearly 20 years ago, Logic Programming - the idea of using logic as a programming language - has been developed to the point where it now plays an important role in areas such as database theory, artificial intelligence and software engineering. However, there are still many challenging research issues to be addressed and the UK branch of the Association for Logic Programming was set up to provide a forum where the flourishing research community could discuss important issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  8
    Computer Science Logic: 11th International Workshop, CSL'97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers.M. Nielsen, Wolfgang Thomas & European Association for Computer Science Logic - 1998 - Springer Verlag.
    This book constitutes the strictly refereed post-workshop proceedings of the 11th International Workshop on Computer Science Logic, CSL '97, held as the 1997 Annual Conference of the European Association on Computer Science Logic, EACSL, in Aarhus, Denmark, in August 1997. The volume presents 26 revised full papers selected after two rounds of refereeing from initially 92 submissions; also included are four invited papers. The book addresses all current aspects of computer science logics and its applications and thus presents the state (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. What is the philosophy of information?Luciano Floridi - 2002 - Metaphilosophy 33 (1-2):123–145.
    Computational and information-theoretic research in philosophy has become increasingly fertile and pervasive, giving rise to a wealth of interesting results. In consequence, a new and vitally important field has emerged, the philosophy of information (PI). This essay is the first attempt to analyse the nature of PI systematically. PI is defined as the philosophical field concerned with the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and the elaboration and application (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  40.  8
    Proceedings of the 1986 Conference on Theoretical Aspects of Reasoning about Knowledge: March 19-22, 1988, Monterey, California.Joseph Y. Halpern, International Business Machines Corporation, American Association of Artificial Intelligence, United States & Association for Computing Machinery - 1986
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  29
    What is the Philosophy of Information?Luciano Floridi - 2002 - Metaphilosophy 33 (1‐2):123-145.
    Computational and information‐theoretic research in philosophy has become increasingly fertile and pervasive, giving rise to a wealth of interesting results. In consequence, a new and vitally important field has emerged, the philosophy of information (PI). This essay is the first attempt to analyse the nature of PI systematically. PI is defined as the philosophical field concerned with the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and the elaboration and application (...)
    Direct download  
     
    Export citation  
     
    Bookmark   48 citations  
  42.  18
    Exploring What Is Encoded in Distributional Word Vectors: A Neurobiologically Motivated Analysis.Akira Utsumi - 2020 - Cognitive Science 44 (6):e12844.
    The pervasive use of distributional semantic models or word embeddings for both cognitive modeling and practical application is because of their remarkable ability to represent the meanings of words. However, relatively little effort has been made to explore what types of information are encoded in distributional word vectors. Knowing the internal knowledge embedded in word vectors is important for cognitive modeling using distributional semantic models. Therefore, in this paper, we attempt to identify the knowledge encoded in word vectors by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  19
    Robots, after all.Hans Moravec - manuscript
    Computers have invaded everyday life, and networked machines are worming their way into our gadgets, dwellings, clothes, even bodies. But if pervasive computing soon handles most of our information needs, it will still not clean the floors, take out the garbage, assemble kit furniture or do any of a thousand other other essential physical tasks. The old dream of mechanical servants will remain mostly unmet.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  16
    Robots among us.Hans Moravec - manuscript
    Bedazzled by the explosion of computers into everyday life, pundits predict a world saturated by communicating chips, in our gadgets, dwellings, clothes, even bodies. But if pervasive computing handles most of our information needs, it will still not clean the floors, take out the garbage, assemble kit furniture or do any of a thousand other other essential physical tasks. The old dream of mechanical servants will remain unmet.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  20
    Introduction to IRIE Vol. 8‖.David Phillips & Klaus Wiegerling - 2007 - International Review of Information Ethics 8:5-6.
    Ubiquitous Computing, an idea introduced by Mark Weiser , and often bracketed with slight modifications under the concepts of Pervasive Computing or Ambient Intelligence, imagines in the extreme case the entire mesosphere saturated by information and communication technologies . All of the essays of this issue probe the practices, ideologies, and power relations of UbiComp development. They note both the successes and the failures of a variety of ethical and theoretical approaches to UbiComp and they offer alternative (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  39
    Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  7
    Practices of place-making through locative media artworks.Elisenda Ardévol & Gemma San Cornelio - 2011 - Communications 36 (3):313-333.
    In recent years, the vast increase in information flows has made it possible to instantly connect location-dependent information with physical spaces. These technologies have provided new forms of the representation of space as much as new forms of perception through tools and techniques used in land surveying, remote sensing, etc. From a critical point of view, pervasive computing, location-based applications, or, in other words, “locative media” provide an interesting framework to understand how these technologies relate to our understanding (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  41
    Augmented societies with mirror worlds.Alessandro Ricci, Luca Tummolini & Cristiano Castelfranchi - 2019 - AI and Society 34 (4):745-752.
    Computing systems can function as augmentation of individual humans as well as of human societies. In this contribution, we take mirror worlds as a conceptual blueprint to envision future smart environments in which the physical and the virtual layers are blended into each other. We suggest that pervasive computing technologies can be used to create a coupling between these layers, so that actions or, more generally, events in the physical layer would have an effect in the virtual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Business Intelligence and Ambient Intelligence-Some thoughts on the main trends of business information processing, their opportunities, prob-lems and limitations.Oliver Siemoneit - 2009 - International Review of Information Ethics 10:02.
    Ambient Intelligence, often also referred to as Pervasive Computing, Ubiquitous Computing or Context-Aware Computing, is supposed to have a lot of advantages for future business information processing. However, as in many cases, technological developments do not only provide opportunities, improve work conditions and make life more comfort for customers, but they also give rise to new problems. Aim of this paper is to discuss the pros and cons of Ambient Intelligence for future business intelligence on the (...)
     
    Export citation  
     
    Bookmark  
  50.  39
    Challenges and Opportunities of Lifelog Technologies: A Literature Review and Critical Analysis.Tim Jacquemard, Peter Novitzky, Fiachra O’Brolcháin, Alan F. Smeaton & Bert Gordijn - 2014 - Science and Engineering Ethics 20 (2):379-409.
    In a lifelog, data from various sources are combined to form a record from which one can retrieve information about oneself and the environment in which one is situated. It could be considered similar to an automated biography. Lifelog technology is still at an early stage of development. However, the history of lifelogs so far shows a clear academic, corporate and governmental interest. Therefore, a thorough inquiry into the ethical aspects of lifelogs could prove beneficial to the responsible development of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
1 — 50 / 1000