Results for 'Operating systems (Computers)'

612 found
Order:
  1.  15
    Virtual Submerged Floating Operational System for Robotic Manipulation.Qin Zhang, Jialei Zhang, Ahmed Chemori & Xianbo Xiang - 2018 - Complexity 2018:1-18.
    In this work, a virtual submerged floating operational system based on parallel and serial robotic platforms is proposed. The primary aim behind its development lies in carrying out simulated underwater manipulation experiments in an easier and safer way. This VSFOS is consisted of a six-degree-of-freedom parallel platform, an ABB serial manipulator, an inertial sensor, and a real-time industrial computer. The 6-DOF platform is used to simulate the movement of an underwater vehicle, whose attitude is measured by the inertial sensor. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  79
    The operative mind: A functional, computational and modeling approach to machine consciousness.Carlos Hernández, Ignacio López & Ricardo Sanz - 2009 - International Journal of Machine Consciousness 1 (1):83-98.
    The functional capabilities that consciousness seems to provide to biological systems can supply valuable principles in the design of more autonomous and robust technical systems. These functional concepts keep a notable similarity to those underlying the notion of operating system in software engineering, which allows us to specialize the computer metaphor for the mind into that of the operating system metaphor for consciousness. In this article, departing from these ideas and a model-based theoretical framework for cognition, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  31
    The system of autono‑mobility: computer vision and urban complexity—reflections on artificial intelligence at urban scale.Fabio Iapaolo - 2023 - AI and Society 38 (3):1111-1122.
    Focused on city-scale automation, and using self-driving cars (SDCs) as a case study, this article reflects on the role of AI—and in particular, computer vision systems used for mapping and navigation—as a catalyst for urban transformation. Urban research commonly presents AI and cities as having a one-way cause-and-effect relationship, giving undue weight to AI’s impact on cities and overlooking the role of cities in shaping AI. Working at the intersection of data science and social research, this paper aims to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  41
    Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery.Jose M. Gonzalez-Cava, Rafael Arnay, Juan Albino Mendez-Perez, Ana León, María Martín, Jose A. Reboso, Esteban Jove-Perez & Jose Luis Calvo-Rolle - 2021 - Logic Journal of the IGPL 29 (2):236-250.
    This work focuses on the application of machine learning techniques to assist the clinicians in the administration of analgesic drug during general anaesthesia. Specifically, the main objective is to propose the basis of an intelligent system capable of making decisions to guide the opioid dose changes based on a new nociception monitor, the analgesia nociception index. Clinical data were obtained from 15 patients undergoing cholecystectomy surgery. By means of an off-line study, machine learning techniques were applied to analyse the possible (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  36
    Situated Ideological Systems: A Formal Concept, a Computational Notation, some Applications.Antônio Carlos da Rocha Costa - 2017 - Axiomathes 27 (1):15-78.
    This paper introduces a formal concept of ideology and ideological system. The formalization takes ideologies and ideological systems to be situated in agent societies. An ideological system is defined as a system of operations able to create, maintain, and extinguish the ideologies adopted by the social groups of agent societies. The concepts of group ideology, ideological contradiction, ideological dominance, and dominant ideology of an agent society, are defined. An ideology-based concept of social group is introduced. Relations between the proposed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  43
    Reflections on Programming Systems: Historical and Philosophical Aspects.Giuseppe Primiero & Liesbeth De Mol (eds.) - 2018 - Cham: Springer Verlag.
    This book presents a systematic philosophical and historical analysis of operating systems (0S). The discussion starts with the evolution of OSs since before their birth. It continues with a comprehensive philosophical analysis grounded in technical aspects. Coverage looks at software and (where appropriate) hardware as well as their historical developments. The authors not only offer historical and philosophical reflections on operating systems. They also explore the programs they coordinate and trace the epsitemic and ontological consequences of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  41
    Operations of power in autonomous weapon systems: ethical conditions and socio-political prospects.Nik Hynek & Anzhelika Solovyeva - 2021 - AI and Society 36 (1):79-99.
    The purpose of this article is to provide a multi-perspective examination of one of the most important contemporary security issues: weaponized, and especially lethal, artificial intelligence. This technology is increasingly associated with the approaching dramatic change in the nature of warfare. What becomes particularly important and evermore intensely contested is how it becomes embedded with and concurrently impacts two social structures: ethics and law. While there has not been a global regime banning this technology, regulatory attempts at establishing a ban (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  15
    Situated Ideological Systems: A Formal Concept, a Computational Notation, some Applications.Antônio Rocha Costa - 2017 - Axiomathes 27 (1):15-78.
    This paper introduces a formal concept of ideology and ideological system. The formalization takes ideologies and ideological systems to be situated in agent societies. An ideological system is defined as a system of operations able to create, maintain, and extinguish the ideologies adopted by the social groups of agent societies. The concepts of group ideology, ideological contradiction, ideological dominance, and dominant ideology of an agent society, are defined. An ideology-based concept of social group is introduced. Relations between the proposed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Enactive autonomy in computational systems.Mario Villalobos & Joe Dewhurst - 2018 - Synthese 195 (5):1891-1908.
    In this paper we will demonstrate that a computational system can meet the criteria for autonomy laid down by classical enactivism. The two criteria that we will focus on are operational closure and structural determinism, and we will show that both can be applied to a basic example of a physically instantiated Turing machine. We will also address the question of precariousness, and briefly suggest that a precarious Turing machine could be designed. Our aim in this paper is to challenge (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  11.  38
    Leviathan: A Simulation of Behavioral Systems, to Operate Dynamically on a Digital Computer. [REVIEW]D. B. N. - 1961 - Review of Metaphysics 15 (1):195-195.
    An explanation of the how and why of computer-simulation of complex, hierarchically organized systems, together with a rough outline of a specific -program suitable for such use. Though the program and the suggested techniques are intrinsically interesting, the claims made for the theoretical and practical consequences of such simulation are perhaps overexpansive. --N. D. B. Jr.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Computation and cognitive science: Introduction to issue.Mark Sprevak - 2010 - Studies in History and Philosophy of Science Part A 41 (3):223-226.
    Nowadays, it has become almost a matter of course to say that the human mind is like a computer. Folks in all walks of life talk of ‘programming’ themselves, ‘multitasking’, running different ‘operating systems’, and sometimes of ‘crashing’ and being ‘rebooted’. Few who have used computers have not been touched by the appeal of the..
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Leviathan: A Simulation of Behavioral Systems, to Operate Dynamically on a Digital Computer.B. K. ROME - 1959
    No categories
     
    Export citation  
     
    Bookmark  
  14.  35
    An extension of Chaitin's halting probability Ω to a measurement operator in an infinite dimensional quantum system.Kohtaro Tadaki - 2006 - Mathematical Logic Quarterly 52 (5):419-438.
    This paper proposes an extension of Chaitin's halting probability Ω to a measurement operator in an infinite dimensional quantum system. Chaitin's Ω is defined as the probability that the universal self-delimiting Turing machine U halts, and plays a central role in the development of algorithmic information theory. In the theory, there are two equivalent ways to define the program-size complexity H of a given finite binary string s. In the standard way, H is defined as the length of the shortest (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  39
    Information systems ethics – challenges and opportunities.Simon Rogerson, Keith W. Miller, Jenifer Sunrise Winter & David Larson - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):87-97.
    Purpose The purpose of this paper is to explore the ethical issues surrounding information systems practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the development and operation of computer-based information systems. Those who undertake the planning, development and operation of these information systems have obligations to assure information integrity and overall to contribute to the public good. This ethical dimension of information systems has attracted mixed attention (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16. The central system as a computational engine.Susan Schneider - unknown
    The Language of Thought program has a suicidal edge. Jerry Fodor, of all people, has argued that although LOT will likely succeed in explaining modular processes, it will fail to explain the central system, a subsystem in the brain in which information from the different sense modalities is integrated, conscious deliberation occurs, and behavior is planned. A fundamental characteristic of the central system is that it is “informationally unencapsulated” -- its operations can draw from information from any cognitive domain. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  23
    Prediction and Application of Computer Simulation in Time-Lagged Financial Risk Systems.Hui Wang, Runzhe Liu, Yang Zhao & Xiaohui Du - 2021 - Complexity 2021:1-10.
    Based on the existing financial system risk models, a set of time-lag financial system risk models is established considering the influence brought by time-lag factors on the financial risk system, and the dynamical behavior of this system is analyzed by using chaos theory. Through Matlab simulation, the bifurcation diagram and phase diagram of time-lag risk intensity and control intensity are plotted. The analysis shows that this kind of time-lag financial system risk model has complex dynamic behavior, different motion states will (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  28
    Situated Ideological Systems: A Formal Concept, a Computational Notation, some Applications.Antônio Carlos Rocha Costa - 2017 - Axiomathes 27 (1):15-78.
    This paper introduces a formal concept of ideology and ideological system. The formalization takes ideologies and ideological systems to be situated in agent societies. An ideological system is defined as a system of operations able to create, maintain, and extinguish the ideologies adopted by the social groups of agent societies. The concepts of group ideology, ideological contradiction, ideological dominance, and dominant ideology of an agent society, are defined. An ideology-based concept of social group is introduced. Relations between the proposed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  11
    Automatic control of computer application data processing system based on artificial intelligence.Ashima Kukkar, Amit Sharma, Lixia Hao & Hong Wang - 2022 - Journal of Intelligent Systems 31 (1):177-192.
    To shorten the travel time and improve comfort, the automatic train driving system is considered to replace manual driving. In this article, an automatic control method of computer application data-processing system based on artificial intelligence is proposed. An automatic train operation (ATO) introduced the structure and function of an autopilot system (train), optimized the train running on the target curve, introduced the basic principle of fuzzy generalized predictive control (PC) algorithm, and combined with the characteristics of ATO system design the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  52
    Revising System Specifications in Temporal Logic.Paulo T. Guerra & Renata Wassermann - 2022 - Journal of Logic, Language and Information 31 (4):591-618.
    Although formal system verification has been around for many years, little attention was given to the case where the specification of the system has to be changed. This may occur due to a failure in capturing the clients’ requirements or due to some change in the domain (think for example of banking systems that have to adapt to different taxes being imposed). We are interested in having methods not only to verify properties, but also to suggest how the system (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21. Computation is just interpretable symbol manipulation; cognition isn't.Stevan Harnad - 1994 - Minds and Machines 4 (4):379-90.
    Computation is interpretable symbol manipulation. Symbols are objects that are manipulated on the basis of rules operating only on theirshapes, which are arbitrary in relation to what they can be interpreted as meaning. Even if one accepts the Church/Turing Thesis that computation is unique, universal and very near omnipotent, not everything is a computer, because not everything can be given a systematic interpretation; and certainly everything can''t be givenevery systematic interpretation. But even after computers and computation have been (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  22.  58
    Vertex Operators in 4D Quantum Gravity Formulated as CFT.Ken-ji Hamada - 2011 - Foundations of Physics 41 (5):863-882.
    We study vertex operators in 4D conformal field theory derived from quantized gravity, whose dynamics is governed by the Wess-Zumino action by Riegert and the Weyl action. Conformal symmetry is equal to diffeomorphism symmetry in the ultraviolet limit, which mixes positive-metric and negative-metric modes of the gravitational field and thus these modes cannot be treated separately in physical operators. In this paper, we construct gravitational vertex operators such as the Ricci scalar, defined as space-time volume integrals of them are invariant (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  23.  39
    Physarum Polycephalum Syllogistic L-Systems and Judaic Roots of Unconventional Computing.Andrew Schumann - 2016 - Studies in Logic, Grammar and Rhetoric 44 (1):181-201.
    We show that in Kabbalah, the esoteric teaching of Judaism, there were developed ideas of unconventional automata in which operations over characters of the Hebrew alphabet can simulate all real processes producing appropriate strings in accordance with some algorithms. These ideas may be used now in a syllogistic extension of Lindenmayer systems, where we deal also with strings in the Kabbalistic-Leibnizean meaning. This extension is illustrated by the behavior of Physarum polycephalum plasmodia which can implement, first, the Aristotelian syllogistic (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  21
    Research on computer static software defect detection system based on big data technology.Rahul Neware, Jyoti Bhola, K. Arumugam, Jianxing Zhu & Zhaoxia Li - 2022 - Journal of Intelligent Systems 31 (1):1055-1064.
    To study the static software defect detection system, based on the traditional static software defect detection system design, a new static software defect detection system design based on big data technology is proposed. The proposed method can optimize the distribution of test resources and improve the quality of software products by predicting the potential defect program modules and design the software and hardware of the static software defect detection system of big data technology. It is found that the traditional static (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25. Turing redux: enculturation and computation.Regina Fabry - 2018 - Cognitive Systems Research 52:793–808.
    Many of our cognitive capacities are shaped by enculturation. Enculturation is the acquisition of cognitive practices such as symbol-based mathematical practices, reading, and writing during ontogeny. Enculturation is associated with significant changes to the organization and connectivity of the brain and to the functional profiles of embodied actions and motor programs. Furthermore, it relies on scaffolded cultural learning in the cognitive niche. The purpose of this paper is to explore the components of symbol-based mathematical practices. Phylogenetically, these practices are the (...)
     
    Export citation  
     
    Bookmark   6 citations  
  26. Abstraction in computer science.Timothy Colburn & Gary Shute - 2007 - Minds and Machines 17 (2):169-184.
    We characterize abstraction in computer science by first comparing the fundamental nature of computer science with that of its cousin mathematics. We consider their primary products, use of formalism, and abstraction objectives, and find that the two disciplines are sharply distinguished. Mathematics, being primarily concerned with developing inference structures, has information neglect as its abstraction objective. Computer science, being primarily concerned with developing interaction patterns, has information hiding as its abstraction objective. We show that abstraction through information hiding is a (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  27.  26
    The Impact of Different System Call Representations on Intrusion Detection.Sarah Wunderlich, Markus Ring, Dieter Landes & Andreas Hotho - 2022 - Logic Journal of the IGPL 30 (2):239-251.
    Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related, non-continuous data like system calls of an operating system. This work focuses on five different options to preprocess sequences of system calls so that they can be processed by neural networks. These input options are based on one-hot encodings and learning word2vec, GloVe or fastText representations of system calls. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. Enzymatic computation and cognitive modularity.H. Clark Barrett - 2005 - Mind and Language 20 (3):259-87.
    Currently, there is widespread skepticism that higher cognitive processes, given their apparent flexibility and globality, could be carried out by specialized computational devices, or modules. This skepticism is largely due to Fodor’s influential definition of modularity. From the rather flexible catalogue of possible modular features that Fodor originally proposed has emerged a widely held notion of modules as rigid, informationally encapsulated devices that accept highly local inputs and whose opera- tions are insensitive to context. It is a mistake, however, to (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   63 citations  
  29.  31
    Brittle System Analysis.Stephen F. Bush, John Hershey & Kirby Vosburgh - forthcoming - Arxiv Preprint Cs/9904016.
    The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Neural and super-Turing computing.Hava T. Siegelmann - 2003 - Minds and Machines 13 (1):103-114.
    ``Neural computing'' is a research field based on perceiving the human brain as an information system. This system reads its input continuously via the different senses, encodes data into various biophysical variables such as membrane potentials or neural firing rates, stores information using different kinds of memories (e.g., short-term memory, long-term memory, associative memory), performs some operations called ``computation'', and outputs onto various channels, including motor control commands, decisions, thoughts, and feelings. We show a natural model of neural computing that (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  31.  14
    On the feasibility of simple brain-computer interface systems for enabling children with severe physical disabilities to explore independent movement.Erica D. Floreani, Danette Rowley, Dion Kelly, Eli Kinney-Lang & Adam Kirton - 2022 - Frontiers in Human Neuroscience 16:1007199.
    IntroductionChildren with severe physical disabilities are denied their fundamental right to move, restricting their development, independence, and participation in life. Brain-computer interfaces (BCIs) could enable children with complex physical needs to access power mobility (PM) devices, which could help them move safely and independently. BCIs have been studied for PM control for adults but remain unexamined in children. In this study, we explored the feasibility of BCI-enabled PM control for children with severe physical disabilities, assessing BCI performance, standard PM skills (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  18
    Tense Operators on Distributive Lattices with Implication.Gustavo Pelaitay & William Zuluaga - 2023 - Studia Logica 111 (4):687-708.
    Inspired by the definition of tense operators on distributive lattices presented by Chajda and Paseka in 2015, in this paper, we introduce and study the variety of tense distributive lattices with implication and we prove that these are categorically equivalent to a full subcategory of the category of tense centered Kleene algebras with implication. Moreover, we apply such an equivalence to describe the congruences of the algebras of each variety by means of tense 1-filters and tense centered deductive systems, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  30
    Computational complexity for bounded distributive lattices with negation.Dmitry Shkatov & C. J. Van Alten - 2021 - Annals of Pure and Applied Logic 172 (7):102962.
    We study the computational complexity of the universal and quasi-equational theories of classes of bounded distributive lattices with a negation operation, i.e., a unary operation satisfying a subset of the properties of the Boolean negation. The upper bounds are obtained through the use of partial algebras. The lower bounds are either inherited from the equational theory of bounded distributive lattices or obtained through a reduction of a global satisfiability problem for a suitable system of propositional modal logic.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  67
    The Computational Origin of Representation.Steven T. Piantadosi - 2020 - Minds and Machines 31 (1):1-58.
    Each of our theories of mental representation provides some insight into how the mind works. However, these insights often seem incompatible, as the debates between symbolic, dynamical, emergentist, sub-symbolic, and grounded approaches to cognition attest. Mental representations—whatever they are—must share many features with each of our theories of representation, and yet there are few hypotheses about how a synthesis could be possible. Here, I develop a theory of the underpinnings of symbolic cognition that shows how sub-symbolic dynamics may give rise (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  35. Dynamic mechanistic explanation: computational modeling of circadian rhythms as an exemplar for cognitive science.William Bechtel & Adele Abrahamsen - 2010 - Studies in History and Philosophy of Science Part A 41 (3):321-333.
    Two widely accepted assumptions within cognitive science are that (1) the goal is to understand the mechanisms responsible for cognitive performances and (2) computational modeling is a major tool for understanding these mechanisms. The particular approaches to computational modeling adopted in cognitive science, moreover, have significantly affected the way in which cognitive mechanisms are understood. Unable to employ some of the more common methods for conducting research on mechanisms, cognitive scientists’ guiding ideas about mechanism have developed in conjunction with their (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   120 citations  
  36.  78
    A System of Relational Syllogistic Incorporating Full Boolean Reasoning.Nikolay Ivanov & Dimiter Vakarelov - 2012 - Journal of Logic, Language and Information 21 (4):433-459.
    We present a system of relational syllogistic, based on classical propositional logic, having primitives of the following form: $$\begin{array}{ll}\mathbf{Some}\, a \,{\rm are} \,R-{\rm related}\, {\rm to}\, \mathbf{some} \,b;\\ \mathbf{Some}\, a \,{\rm are}\,R-{\rm related}\, {\rm to}\, \mathbf{all}\, b;\\ \mathbf{All}\, a\, {\rm are}\,R-{\rm related}\, {\rm to}\, \mathbf{some}\, b;\\ \mathbf{All}\, a\, {\rm are}\,R-{\rm related}\, {\rm to}\, \mathbf{all} \,b.\end{array}$$ Such primitives formalize sentences from natural language like ‘ All students read some textbooks’. Here a, b denote arbitrary sets (of objects), and R denotes an (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  23
    日常言語コンピューティング (第2報)―日常言語に基づく計算機資源の管理・実行環境を目指して―.小林 一郎 岩爪 道昭 - 2003 - Transactions of the Japanese Society for Artificial Intelligence 18:45-56.
    The a Everyday language computing is a new computational paradigm that all people, from small children to aged persons, can access and use computing systems with his/her own everyday language. As a way to realize ELC, we proposed a framework of language-based operating system, and we are now working intensively to develop the fundamental part of it. In this paper, we report our status of research on LOS. One of the main components of LOS is the semiotic base, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  16
    日常言語コンピューティング 言語現象の社会的・機能的解明と日常言語オペレーティングシステムの実現に向けて.小林 一郎 岩爪 道昭 - 2002 - Transactions of the Japanese Society for Artificial Intelligence 17:181-185.
    The aim of this study is to provide all people, from small children to aged persons, with a computational environment for everyday language communication. In order to achieve this, we propose a framework for a language-based operating system. In this paper, we explain our approach to dealing with the meaning of language, the architecture of the language operating system and its components. In particular, we describe the notion of language protocol and its resource representation, compared to the other (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Computing in the nick of time.J. Brendan Ritchie & Colin Klein - 2023 - Ratio 36 (3):169-179.
    The medium‐independence of computational descriptions has shaped common conceptions of computational explanation. So long as our goal is to explain how a system successfully carries out its computations, then we only need to describe the abstract series of operations that achieve the desired input–output mapping, however they may be implemented. It is argued that this abstract conception of computational explanation cannot be applied to so‐called real‐time computing systems, in which meeting temporal deadlines imposed by the systems with which (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  41
    Sequent Systems for Negative Modalities.Ori Lahav, João Marcos & Yoni Zohar - 2017 - Logica Universalis 11 (3):345-382.
    Non-classical negations may fail to be contradictory-forming operators in more than one way, and they often fail also to respect fundamental meta-logical properties such as the replacement property. Such drawbacks are witnessed by intricate semantics and proof systems, whose philosophical interpretations and computational properties are found wanting. In this paper we investigate congruential non-classical negations that live inside very natural systems of normal modal logics over complete distributive lattices; these logics are further enriched by adjustment connectives that may (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  71
    Computing Strong and Weak Permissions in Defeasible Logic.Guido Governatori, Francesco Olivieri, Antonino Rotolo & Simone Scannapieco - 2013 - Journal of Philosophical Logic 42 (6):799-829.
    In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  42.  35
    Operative communication: project Cybersyn and the intersection of information design, interface design, and interaction design.Sebastian Vehlken - 2022 - AI and Society 37 (3):1131-1152.
    This article examines the connecting lines between the Chilean Project Cybersyn’s interface design, the German Hochschule für Gestaltung Ulm and its cybernetically inspired approaches towards information design, and later developments in interaction design and the emerging field of Human–Computer Interaction in the USA. In particular, it first examines how early works of designers Tomàs Maldonado and Gui Bonsiepe on operative communication, that is, language-independent pictogram systems and visual grammars for computational systems, were intertwined with attempts to ground industrial (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  33
    Is Nonsymbolic Arithmetic Truly “Arithmetic”? Examining the Computational Capacity of the Approximate Number System in Young Children.Chen Cheng & Melissa M. Kibbe - 2023 - Cognitive Science 47 (6):e13299.
    Young children with limited knowledge of formal mathematics can intuitively perform basic arithmetic‐like operations over nonsymbolic, approximate representations of quantity. However, the algorithmic rules that guide such nonsymbolic operations are not entirely clear. We asked whether nonsymbolic arithmetic operations have a function‐like structure, like symbolic arithmetic. Children (n = 74 4‐ to ‐8‐year‐olds in Experiment 1; n = 52 7‐ to 8‐year‐olds in Experiment 2) first solved two nonsymbolic arithmetic problems. We then showed children two unequal sets of objects, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  7
    On the individuation of complex computational models: Gilbert Simondon and the technicity of AI.Susana Aires - forthcoming - AI and Society:1-14.
    The proliferation of AI systems across all domains of life as well as the complexification and opacity of algorithmic techniques, epitomised by the bourgeoning field of Deep Learning (DL), call for new methods in the Humanities for reflecting on the techno-human relation in a way that places the technical operation at its core. Grounded on the work of the philosopher of technology Gilbert Simondon, this paper puts forward individuation theory as a valuable approach to reflect on contemporary information technologies, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  31
    Elementary explicit types and polynomial time operations.Daria Spescha & Thomas Strahm - 2009 - Mathematical Logic Quarterly 55 (3):245-258.
    This paper studies systems of explicit mathematics as introduced by Feferman [9, 11]. In particular, we propose weak explicit type systems with a restricted form of elementary comprehension whose provably terminating operations coincide with the functions on binary words that are computable in polynomial time. The systems considered are natural extensions of the first-order applicative theories introduced in Strahm [19, 20].
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  29
    Guidance systems: from autonomous directives to legal sensor-bilities.Simon M. Taylor & Marc De Leeuw - 2021 - AI and Society 36 (2):521-534.
    The design of collaborative robotics, such as driver-assisted operations, engineer a potential automation of decision-making predicated on unobtrusive data gathering of human users. This form of ‘somatic surveillance’ increasingly relies on behavioural biometrics and sensory algorithms to verify the physiology of bodies in cabin interiors. Such processes secure cyber-physical space, but also register user capabilities for control that yield data as insured risk. In this technical re-formation of human–machine interactions for control and communication ‘a dissonance of attribution’ :7684, 2019. https://doi.org/10.1073/pnas.1805770115) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  7
    Spatial temporal information systems: an ontological approach using STK.Linda M. McNeil - 2013 - Boca Raton: CRC Press. Edited by T. S. Kelso.
    Designed to be a high-level, approachable resource for engineers who need further insight into spatial temporal information systems from an ontological perspective, Spatial Temporal Information Systems: An Ontological Approach using STK® explains the dynamics of objects interaction from signal analysis to trajectory design, spatial modeling, and other spatial analytics by using STK®, which is a general-purpose modeling and analysis application for any type of space, defense, or intelligence system. Building a foundation to begin the study of spatial temporal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. Cognitive systems for revenge and forgiveness.Michael E. McCullough, Robert Kurzban & Benjamin A. Tabak - 2013 - Behavioral and Brain Sciences 36 (1):1-15.
    Minimizing the costs that others impose upon oneself and upon those in whom one has a fitness stake, such as kin and allies, is a key adaptive problem for many organisms. Our ancestors regularly faced such adaptive problems (including homicide, bodily harm, theft, mate poaching, cuckoldry, reputational damage, sexual aggression, and the infliction of these costs on one's offspring, mates, coalition partners, or friends). One solution to this problem is to impose retaliatory costs on an aggressor so that the aggressor (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  49.  28
    Towards Operational Abduction from a Cognitive Perspective.Peter Bruza, Richard Cole, Dawei Song & Zeeniya Bari - 2006 - Logic Journal of the IGPL 14 (2):161-177.
    Diminishing awareness is a consequence of the information explosion: disciplines are becoming increasingly specialized; individuals and groups are becoming ever more insular. This article considers how awareness can be enhanced via operational abductive systems. The goal is to generate and justify suggestions which can span disparate islands of knowledge. Knowledge representation is motivated from a cognitive perspective. Words and concepts are represented as vectors in a high dimensional semantic space automatically derived from a text corpus. Various mechanisms will be (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  12
    Behavior and Its Causes: Philosophical Foundations of Operant Psychology.T. L. Smith - 2013 - Springer Verlag.
    This series will include monographs and collections of studies devoted to the investigation and exploration of knowledge, information, and data-processing systems of all kinds, no matter whether human, (other) animal, or machine. Its scope is intended to span the full range of interests from classical problems in the philosophy of mind and philosophical psychology through issues in cognitive psychology and sociobiology (concerning the mental capabilities of other species) to ideas related to artificial intelligence and computer science. While primary emphasis (...)
    Direct download  
     
    Export citation  
     
    Bookmark   36 citations  
1 — 50 / 612