Results for 'Computer network exploitation'

976 found
Order:
  1. International Workshop on Sensor Networks (IWSN 2006)-Robust Multipath Routing to Exploit Maximally Disjoint Paths for Wireless Ad Hoe Networks.Jungtae Kim, Sangman Moh, Ilyong Chung & Chansu Yu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 306-309.
    No categories
     
    Export citation  
     
    Bookmark  
  2. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Threshold Phenomena in Epistemic Networks.Patrick Grim - 2006 - In Proceedings, AAAI Fall Symposium on Complex Adaptive Systems and the Threshold Effect. AAAI Press.
    A small consortium of philosophers has begun work on the implications of epistemic networks (Zollman 2008 and forthcoming; Grim 2006, 2007; Weisberg and Muldoon forthcoming), building on theoretical work in economics, computer science, and engineering (Bala and Goyal 1998, Kleinberg 2001; Amaral et. al., 2004) and on some experimental work in social psychology (Mason, Jones, and Goldstone, 2008). This paper outlines core philosophical results and extends those results to the specific question of thresholds. Epistemic maximization of certain types does (...)
    Direct download  
     
    Export citation  
     
    Bookmark   21 citations  
  4.  11
    Compulsion beyond fairness: towards a critical theory of technological abstraction in neural networks.Leonie Hunter - forthcoming - AI and Society:1-10.
    In the field of applied computer research, the problem of the reinforcement of existing inequalities through the processing of “big data” in neural networks is typically addressed via concepts of representation and fairness. These approaches, however, tend to overlook the limits of the liberal antidiscrimination discourse, which are well established in critical theory. In this paper, I address these limits and propose a different framework for understanding technologically amplified oppression departing from the notion of “mute compulsion” (Marx), a specifically (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  48
    CaMeRa: A Computational Model of Multiple Representations.Hermina J. M. Tabachneck-Schijf, Anthony M. Leonardo & Herbert A. Simon - 1997 - Cognitive Science 21 (3):305-350.
    This research aims to clarify, by constructing and testing a computer simulation, the use of multiple representations in problem solving, focusing on their role in visual reasoning. The model is motivated by extensive experimental evidence in the literature for the features it incorporates, but this article focuses on the system's structure. We illustrate the model's behavior by simulating the cognitive and perceptual processes of an economics expert as he teaches some well‐learned economics principles while drawing a graph on a (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  6. On the Physical Explanation for Quantum Computational Speedup.Michael Cuffaro - 2013 - Dissertation, The University of Western Ontario
    The aim of this dissertation is to clarify the debate over the explanation of quantum speedup and to submit, for the reader's consideration, a tentative resolution to it. In particular, I argue, in this dissertation, that the physical explanation for quantum speedup is precisely the fact that the phenomenon of quantum entanglement enables a quantum computer to fully exploit the representational capacity of Hilbert space. This is impossible for classical systems, joint states of which must always be representable as (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  63
    How to Think About Cyber Conflicts Involving Non-state Actors.Phillip McReynolds - 2015 - Philosophy and Technology 28 (3):427-448.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions such actions, though illegal, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Introduction: The Ethics of E-Games.Elizabeth Buchanan & Charles Ess - 2005 - International Review of Information Ethics 4:2-6.
    E-games are a dramatically expanding dimension of contemporary exploitations of computing and computer network technologies - one that, thus far, has evoked much more heat among parents and politicians than light in the form of serious scholarly and philosophical analysis. We argue that e-games deserve such analysis in part because of their intrinsic philosophical interest as they raise primary philosophical questions of ontology, epistemology, human nature, the character of "gameplay," - and most especially, of ethics. We further suggest (...)
    No categories
     
    Export citation  
     
    Bookmark  
  9.  26
    Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy.Bo Zhang & Rongji Liao - 2021 - Complexity 2021:1-10.
    The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. Therefore, the use of these elements in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  11.  19
    A Social Interpolation Model of Group Problem‐Solving.Sabina J. Sloman, Robert L. Goldstone & Cleotilde Gonzalez - 2021 - Cognitive Science 45 (12):e13066.
    How do people use information from others to solve complex problems? Prior work has addressed this question by placing people in social learning situations where the problems they were asked to solve required varying degrees of exploration. This past work uncovered important interactions between groups' connectivity and the problem's complexity: the advantage of less connected networks over more connected networks increased as exploration was increasingly required for optimally solving the problem at hand. We propose the Social Interpolation Model (SIM), an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  27
    Les machines y voient-elles quelque chose?Denis Bonnay - 2021 - Astérion 25 (25).
    Computer vision is one of AI’s most successful fields. In the last twenty years, machines have become increasingly good at extracting information from images and at identifying objects. But does this mean that machines really can see, or is computer vision just a fancy metaphor for object detection? This paper aims to provide a reasoned answer to the question. First, three criteria for vision attribution are reviewed and it is argued that a functionalist criterion, in terms of exploitable (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  14
    Towards a computational network theory of social groups.Daniel Redhead, Riana Minocher & Dominik Deffner - 2022 - Behavioral and Brain Sciences 45.
    Network theory is necessary for the realization of cognitive representations and resulting empirical observations of social groups. We propose that the triadic primitives denoting individual roles are multilayer, with positive and negative relations feeding into cost–benefit calculations. Through this, we advance a computational theory that generalizes to different scales and to contexts where conflict is not present.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  35
    Case Classification, Similarities, Spaces of Reasons, and Coherences.Marcello Guarini - unknown
    A simple recurrent artificial neural network is used to classify situations as permissible or impermissible. The trained ANN can be understood as having set up a similarity space of cases at the level of its internal or hidden units. An analysis of the network’s internal representations is undertaken using a new visualization technique for state space approaches to understanding similarity. Insights from the literature on moral philosophy pertaining to contributory standards will be used to interpret the state space (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  15. More broadly, computer networks have made interaction between.Cultures In Collision - 2002 - In James Moor & Terrell Ward Bynum (eds.), Cyberphilosophy: the intersection of philosophy and computing. Malden, MA: Blackwell.
  16.  87
    PRM inference using Jaffray & Faÿ’s Local Conditioning.Christophe Gonzales & Pierre-Henri Wuillemin - 2011 - Theory and Decision 71 (1):33-62.
    Probabilistic Relational Models (PRMs) are a framework for compactly representing uncertainties (actually probabilities). They result from the combination of Bayesian Networks (BNs), Object-Oriented languages, and relational models. They are specifically designed for their efficient construction, maintenance and exploitation for very large scale problems, where BNs are known to perform poorly. Actually, in large-scale problems, it is often the case that BNs result from the combination of patterns (small BN fragments) repeated many times. PRMs exploit this feature by defining these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  29
    Efficacy and Brain Imaging Correlates of an Immersive Motor Imagery BCI-Driven VR System for Upper Limb Motor Rehabilitation: A Clinical Case Report.Athanasios Vourvopoulos, Carolina Jorge, Rodolfo Abreu, Patrícia Figueiredo, Jean-Claude Fernandes & Sergi Bermúdez I. Badia - 2019 - Frontiers in Human Neuroscience 13:460149.
    To maximize brain plasticity after stroke, several rehabilitation strategies have been explored, including the use of intensive motor training, motor imagery, and action observation. Growing evidence of the positive impact of virtual reality (VR) techniques on recovery following stroke has been shown. However, most VR tools are designed to exploit active movement, and hence patients with low level of motor control cannot fully benefit from them. Consequently, the idea of directly training the central nervous system has been promoted by utilizing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  35
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  36
    An interdisciplinary approach to address identity theft education.S. Helser - 2011 - Acm Sigcas Computers and Society 41 (2):38-50.
    An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society at Saint Xavier University in Chicago, Illinois. The focus of this paper is to present observations related to information assurance in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  20.  16
    Attack scenario graphs for computer network threat analysis and prediction.Todd Hughes & Oleg Sheyner - 2003 - Complexity 9 (2):15-18.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  17
    The Information Web: Ethical and Social Implications of Computer Networking.Carol C. Gould (ed.) - 1989 - Routledge.
    This book deals with the major ethical and social implications of computer networking and its technological development. In this book, a number of leading thinkers--philosophers, computer scientists and researchers--address some fundamental questions posed by the new technology.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  36
    Protecting critical infrastructure: implementing integration and expanding education: first prize: 2007 Schubmehl-Prein Essay contest.David A. Martinez - 2008 - Acm Sigcas Computers and Society 38 (1):12-17.
    The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, computers have been controlling our nation's critical sectors nearly every step of the way. As designers of today's critical systems gravitate slowly towards systems that require less human oversight than ever before, the vulnerability of the networks that control our electricity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23. Carol Gould, ed., The Information Web: Ethical and Social Implications of Computer Networking Reviewed by.Kristin Shrader-Frechette - 1990 - Philosophy in Review 10 (3):110-112.
     
    Export citation  
     
    Bookmark  
  24. Some Useful 16-Valued Logics: How a Computer Network Should Think.Yaroslav Shramko & Heinrich Wansing - 2005 - Journal of Philosophical Logic 34 (2):121-153.
    In Belnap's useful 4-valued logic, the set 2 = {T, F} of classical truth values is generalized to the set 4 = ������(2) = {Ø, {T}, {F}, {T, F}}. In the present paper, we argue in favor of extending this process to the set 16 = ᵍ (4) (and beyond). It turns out that this generalization is well-motivated and leads from the bilattice FOUR₂ with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN₃ with an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  25.  15
    A Pseudo-Deterministic Noisy Extremal Optimization algorithm for the pairwise connectivity Critical Node Detection Problem.Noémi Gaskó, Mihai-Alexandru Suciu, Rodica Ioana Lung & Tamás Képes - forthcoming - Logic Journal of the IGPL.
    The critical node detection problem is a central task in computational graph theory due to its large applicability, consisting in deleting $k$ nodes to minimize a certain graph measure. In this article, we propose a new Extremal Optimization-based approach, the Pseudo-Deterministic Noisy Extremal Optimization (PDNEO) algorithm, to solve the Critical Node Detection variant in which the pairwise connectivity is minimized. PDNEO uses an adaptive pseudo-deterministic parameter to switch between random nodes and articulation points during the search, as well as other (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  16
    Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming (...) traffic raw data onto derived one suitable for ML models. In this work, we study the effects of applying one such FE technique in different ways on the performance of two ML models (linear and non-linear) and their selected features. This the Feature as a Counter approach. The derived observations are computed from either with the same number of raw samples, (batch-based approaches) or by aggregating them by time intervals (timestamp-based approach). Results show that there is no significant differences between the proposed approaches neither in the performance of the models nor in the selected features that validate our proposal making it feasible to be widely used as a standard FE method. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  11
    Emergent computation: Self-organizing, collective, and cooperative phenomena in natural and artificial computing networks.Peter M. Todd - 1993 - Artificial Intelligence 60 (1):171-183.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    (1 other version)Beneficent Intelligence: A Capability Approach to Modeling Benefit, Assistance, and Associated Moral Failures Through AI Systems.Alex John London & Hoda Heidari - 2024 - Minds and Machines 34 (4):1-37.
    The prevailing discourse around AI ethics lacks the language and formalism necessary to capture the diverse ethical concerns that emerge when AI systems interact with individuals. Drawing on Sen and Nussbaum’s capability approach, we present a framework formalizing a network of ethical concepts and entitlements necessary for AI systems to confer meaningful benefit or assistance to stakeholders. Such systems enhance stakeholders’ ability to advance their life plans and well-being while upholding their fundamental rights. We characterize two necessary conditions for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  35
    Crossing the Rubicon: Understanding Cyber Terrorism in the European Context.Emerald M. Archer - 2014 - The European Legacy 19 (5):606-621.
    The first decade of the twenty-first century introduced a cultural shift where terrorism is concerned by making new technologies such as computers and networks available as both tools and targets for exploitation. The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. Using cyber technologies has many benefits for the user and the potential of causing more damage (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Brain inspired cognitive systems (BICS).Ron Chrisley - unknown
    This Neurocomputing special issue is based on selected, expanded and significantly revised versions of papers presented at the Second International Conference on Brain Inspired Cognitive Systems (BICS 2006) held at Lesvos, Greece, from 10 to 14 October 2006. The aim of BICS 2006, which followed the very successful first BICS 2004 held at Stirling, Scotland, was to bring together leading scientists and engineers who use analytic, syntactic and computational methods both to understand the prodigious processing properties of biological systems and, (...)
     
    Export citation  
     
    Bookmark  
  31. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  51
    Universal computation in fluid neural networks.Ricard V. Solé & Jordi Delgado - 1996 - Complexity 2 (2):49-56.
    Fluid neural networks can be used as a theoretical framework for a wide range of complex systems as social insects. In this article we show that collective logical gates can be built in such a way that complex computation can be possible by means of the interplay between local interactions and the collective creation of a global field. This is exemplified by a NOR gate. Some general implications for ant societies are outlined. ©.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  12
    Resilient and adaptive defense of computing networks.Robert Ghanea-Hercock - 2003 - Complexity 9 (2):13-14.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  44
    A Computational Model for the Item‐Based Induction of Construction Networks.Judith Gaspers & Philipp Cimiano - 2014 - Cognitive Science 38 (3):439-488.
    According to usage‐based approaches to language acquisition, linguistic knowledge is represented in the form of constructions—form‐meaning pairings—at multiple levels of abstraction and complexity. The emergence of syntactic knowledge is assumed to be a result of the gradual abstraction of lexically specific and item‐based linguistic knowledge. In this article, we explore how the gradual emergence of a network consisting of constructions at varying degrees of complexity can be modeled computationally. Linguistic knowledge is learned by observing natural language utterances in an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  31
    Economies of disclosure.Jeff Bollinger - 2004 - Acm Sigcas Computers and Society 34 (3):1-1.
    Imagine this scenario: a bank customer walks up to an ATM to withdraw cash from her account. While entering her PIN, she accidentally presses the '3' key at the same time as the 'Clear' key. Instantly $100 comes out of the cash dispenser! Curious, she checks the receipt and seeing that the money did not from her account, she tries the same operation. Again, $100 comes out of the cash dispenser. At this point she has two options, A: she can (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  36.  25
    The Computational Challenges of Means Selection Problems: Network Structure of Goal Systems Predicts Human Performance.Daniel Reichman, Falk Lieder, David D. Bourgin, Nimrod Talmon & Thomas L. Griffiths - 2023 - Cognitive Science 47 (8):e13330.
    We study human performance in two classical NP‐hard optimization problems: Set Cover and Maximum Coverage. We suggest that Set Cover and Max Coverage are related to means selection problems that arise in human problem‐solving and in pursuing multiple goals: The relationship between goals and means is expressed as a bipartite graph where edges between means and goals indicate which means can be used to achieve which goals. While these problems are believed to be computationally intractable in general, they become more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Some Neural Networks Compute, Others Don't.Gualtiero Piccinini - 2008 - Neural Networks 21 (2-3):311-321.
    I address whether neural networks perform computations in the sense of computability theory and computer science. I explicate and defend
    the following theses. (1) Many neural networks compute—they perform computations. (2) Some neural networks compute in a classical way.
    Ordinary digital computers, which are very large networks of logic gates, belong in this class of neural networks. (3) Other neural networks
    compute in a non-classical way. (4) Yet other neural networks do not perform computations. Brains may well fall into this last class.
     
    Export citation  
     
    Bookmark   18 citations  
  38.  42
    A Network is a Network is a Network: Reflections on the Computational and the Societies of Control.David M. Berry & Alexander R. Galloway - 2016 - Theory, Culture and Society 33 (4):151-172.
    In this wide-ranging conversation, Berry and Galloway explore the implications of undertaking media theoretical work for critiquing the digital in a time when networks proliferate and, as Galloway claims, we need to ‘forget Deleuze’. Through the lens of Galloway’s new book, Laruelle: Against the Digital, the potential of a ‘non-philosophy’ for media is probed. From the import of the allegorical method from excommunication to the question of networks, they discuss Galloway’s recent work and reflect on the implications of computation for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  34
    Patterns of Rationality: Recurring Inferences in Science, Social Cognition and Religious Thinking.Tommaso Bertolotti - 2015 - Cham: Imprint: Springer.
    The book is an epistemological monograph written from a multidisciplinary perspective. It provides a complex and realistic picture of cognition and rationality, as endowments aimed at making sense and reacting smartly to one's environment, be it epistemic, social or simply ecological. The first part of the book analyzes scientific modeling as products of the biological necessity to cope with the environment and be able to draw as many inferences as possible about it. Moreover, it develops an epistemological framework which will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  27
    On Computing Structural and Behavioral Complexities of Threshold Boolean Networks: Application to Biological Networks.Urvan Christen, Sergiu Ivanov, Rémi Segretain, Laurent Trilling & Nicolas Glade - 2019 - Acta Biotheoretica 68 (1):119-138.
    Various threshold Boolean networks, a formalism used to model different types of biological networks, can produce similar dynamics, i.e. share same behaviors. Among them, some are complex, others not. By computing both structural and behavioral complexities, we show that most TBNs are structurally complex, even those having simple behaviors. For this purpose, we developed a new method to compute the structural complexity of a TBN based on estimates of the sizes of equivalence classes of the threshold Boolean functions composing the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  19
    Research on the teaching innovation model of undergraduate musical ecology course under computer network environment.Bo Wang - 2022 - Educational Philosophy and Theory 54 (7):992-1002.
    Education ecology is a new crossover research field in network age. Its research content can be either microscopic classroom teaching or macro educational ecology research on teaching and culture. The university music classroom is a special kind of ecology. The reason why this is special is that compared to natural ecology, the classroom ecology of university music has a unique relationship between the environment and the subject. The classroom is ecological and becomes the logical prerequisite for ecological research in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  33
    Diana Hook;, Jeremy Norman. Origins of Cyberspace: A Library on the History of Computing, Networking, and Telecommunications. x + 670 pp., illus., index. Novato, Calif.: Norman Publishing, 2002. $500. [REVIEW]Michael Mahoney - 2004 - Isis 95 (4):723-724.
  43.  30
    Enchanted Looms: Conscious Networks in Brains and Computers.Rodney Cotterill - 1998 - Cambridge University Press.
    The title of this book was inspired by a passage in Charles Sherrington's Man on his Nature.
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  44.  11
    A Computational Turn in Policy Process Studies: Coevolving Network Dynamics of Policy Change.Maxime Stauffer, Isaak Mengesha, Konrad Seifert, Igor Krawczuk, Jens Fischer & Giovanna Di Marzo Serugendo - 2022 - Complexity 2022:1-17.
    The past three decades of policy process studies have seen the emergence of a clear intellectual lineage with regard to complexity. Implicitly or explicitly, scholars have employed complexity theory to examine the intricate dynamics of collective action in political contexts. However, the methodological counterparts to complexity theory, such as computational methods, are rarely used and, even if they are, they are often detached from established policy process theory. Building on a critical review of the application of complexity theory to policy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  39
    Computing Nature–A Network of Networks of Concurrent Information Processes.Gordana Dodig-Crnkovic & Raffaela Giovagnoli - 2013 - In Gordana Dodig-Crnkovic Raffaela Giovagnoli (ed.), Computing Nature. pp. 1--22.
    This text presents the research field of natural/unconventional computing as it appears in the book COMPUTING NATURE. The articles discussed consist a selection of works from the Symposium on Natural Computing at AISB-IACAP (British Society for the Study of Artificial Intelligence and the Simulation of Behaviour and The International Association for Computing and Philosophy) World Congress 2012, held at the University of Birmingham, celebrating Turing centenary. The COMPUTING NATURE is about nature considered as the totality of physical existence, the universe. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  48
    Brokers and bricoleurs: entrepreneurship in Wales' online music scene. [REVIEW]Gillian Allard - 2003 - AI and Society 17 (1):12-24.
    The power of some new entrants to the music industry derives from their position as brokers in computer-mediated environments. Brokers act instrumentally to exploit their position within a network which, in turn, depends on their ability to build and sustain links (and, in computer-mediated environments, hyperlinks). Bricolage in computer-mediated entrepreneurship refers to the intuitive manipulation of resources in order to achieve (perhaps tacit) goals. Without careful stewardship of the new intellectual wealth thus created, bricolage may profit (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  47.  63
    Interactive Activation and Mutual Constraint Satisfaction in Perception and Cognition.James L. McClelland, Daniel Mirman, Donald J. Bolger & Pranav Khaitan - 2014 - Cognitive Science 38 (6):1139-1189.
    In a seminal 1977 article, Rumelhart argued that perception required the simultaneous use of multiple sources of information, allowing perceivers to optimally interpret sensory information at many levels of representation in real time as information arrives. Building on Rumelhart's arguments, we present the Interactive Activation hypothesis—the idea that the mechanism used in perception and comprehension to achieve these feats exploits an interactive activation process implemented through the bidirectional propagation of activation among simple processing units. We then examine the interactive activation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  48. Exploiting Fluencies: Educational Expropriation of Social Networking Site Consumer Training.Lucinda Rush & D. E. Wittkower - 2014 - Digital Culture and Education 6 (1).
     
    Export citation  
     
    Bookmark  
  49.  19
    Computation of the Complexity of Networks under Generalized Operations.Hafiz Usman Afzal, Muhammad Javaid, Ali Ovais & Md Nur Alam - 2022 - Complexity 2022:1-20.
    The connected and acyclic components contained in a network are identified by the computation of its complexity, where complexity of a network refers to the total number of spanning trees present within. The article in hand deals with the enumeration of the complexity of various networks’ operations such as sum, product, difference K 2, n ⊖ K 2, and the conjunction of S n with K 2. All our computations have been concluded by implementation of the methods of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  20
    Exploiting Interslice Correlation for MRI Prostate Image Segmentation, from Recursive Neural Networks Aspect.Qikui Zhu, Bo Du, Baris Turkbey, Peter Choyke & Pingkun Yan - 2018 - Complexity 2018:1-10.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976