Results for 'computational constraints'

971 found
Order:
  1.  26
    Computational Constraints in Cognitive Theories of Forgetting.Ullrich K. H. Ecker & Stephan Lewandowsky - 2012 - Frontiers in Psychology 3.
  2.  34
    Recurring Models and Sensitivity to Computational Constraints.Anouk Barberousse & Cyrille Imbert - 2014 - The Monist 97 (3):259-279.
    Why are some models, like the harmonic oscillator, the Ising model, a few Hamiltonian equations in quantum mechanics, the poisson equation, or the Lokta-Volterra equations, repeatedly used within and across scientific domains, whereas theories allow for many more modeling possibilities? Some historians and philosophers of science have already proposed plausible explanations. For example, Kuhn and Cartwright point to a tendency toward conservatism in science, and Humphreys emphasizes the importance of the intractability of what he calls “templates.” This paper investigates more (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  23
    Why do we SLIP to the basic level? Computational constraints and their implementation.Frédéric Gosselin & Philippe G. Schyns - 2001 - Psychological Review 108 (4):735-758.
  4.  41
    Computational models and empirical constraints.Zenon W. Pylyshyn - 1978 - Behavioral and Brain Sciences 1 (1):98-128.
    It is argued that the traditional distinction between artificial intelligence and cognitive simulation amounts to little more than a difference in style of research - a different ordering in goal priorities and different methodological allegiances. Both enterprises are constrained by empirical considerations and both are directed at understanding classes of tasks that are defined by essentially psychological criteria. Because of the different ordering of priorities, however, they occasionally take somewhat different stands on such issues as the power/generality trade-off and on (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   98 citations  
  5. Computational molecular biology: A promising application using logic programming and constraint logic programming.J. Cohen - 1999 - In P. Brezillon & P. Bouquet, Lecture Notes in Artificial Intelligence. Springer.
     
    Export citation  
     
    Bookmark  
  6. Empirical Constraints on Computational Theories of Metaphor: Comments on Indurkhya.Richard J. Gerrig - 1989 - Cognitive Science 13 (2):235-241.
    Empirical analyses have provided some important constraints for computational theories of metaphor. Three such constraints relate to (1) the similar processing time for literal and metaphorical language, (2) the time‐limited processing of many metaphors, and (3) the dissociation of metaphor comprehension and appreciation. Indurkhya's (1986, 1987) model is discussed with respect to these issues.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  31
    Computational complexity of linear constraints over the integers.Peter Jonsson & Tomas Lööw - 2013 - Artificial Intelligence 195 (C):44-62.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  37
    Quantum computation and the untenability of a “No fundamental mentality” constraint on physicalism.Christopher Devlin Brown - 2022 - Synthese 201 (1):1-18.
    Though there is yet no consensus on the right way to understand ‘physicalism’, most philosophers agree that, regardless of whatever else is required, physicalism cannot be true if there exists fundamental mentality. I will follow Jessica Wilson (Philosophical Studies 131:61–99, 2006) in calling this the 'No Fundamental Mentality' (NFM) constraint on physicalism. Unfortunately for those who wish to constrain physicalism in this way, NFM admits of a counterexample: an artificially intelligent quantum computer which employs quantum properties as part of its (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  48
    Selectional constraints: an information-theoretic model and its computational realization.Philip Resnik - 1996 - Cognition 61 (1-2):127-159.
  10.  16
    Computational properties of argument systems satisfying graph-theoretic constraints.Paul E. Dunne - 2007 - Artificial Intelligence 171 (10-15):701-729.
  11.  58
    Computational and biological constraints in the psychology of reasoning.Mike Oaksford & Mike Malloch - 1993 - Behavioral and Brain Sciences 16 (3):468-469.
  12. The Role of Natural Constraints in Computational Theories of Vision.Peter Alan Morton - 1991 - Dissertation, The University of Western Ontario (Canada)
    The thesis examines the philosophical implications of the computational theory of early vision developed by Marr. According to Marr, early visual processes consist of sequences of "modular" computational mechanisms. These processes rely on functional relations between rates of change in stimulus magnitudes which result from certain contingent, global properties--natural constraints--of the physical world. ;Marr argues that explanations of early vision must have three distinct levels of description: computational, algorithmic and physical. In Chapter 1 I defend the (...)
     
    Export citation  
     
    Bookmark  
  13.  76
    Modeling complexity: cognitive constraints and computational model-building in integrative systems biology.Miles MacLeod & Nancy J. Nersessian - 2018 - History and Philosophy of the Life Sciences 40 (1):17.
    Modern integrative systems biology defines itself by the complexity of the problems it takes on through computational modeling and simulation. However in integrative systems biology computers do not solve problems alone. Problem solving depends as ever on human cognitive resources. Current philosophical accounts hint at their importance, but it remains to be understood what roles human cognition plays in computational modeling. In this paper we focus on practices through which modelers in systems biology use computational simulation and (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  14.  25
    Using constraint metaknowledge to reduce arc consistency computation.Christian Bessiére, Eugene C. Freuder & Jean-Charles Regin - 1999 - Artificial Intelligence 107 (1):125-148.
  15.  8
    Computing and restoring global inverse consistency in interactive constraint satisfaction.Christian Bessiere, Hélène Fargier & Christophe Lecoutre - 2016 - Artificial Intelligence 241 (C):153-169.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  14
    Computing leximin-optimal solutions in constraint networks.Sylvain Bouveret & Michel Lemaître - 2009 - Artificial Intelligence 173 (2):343-364.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  17
    Computing AES related-key differential characteristics with constraint programming.David Gerault, Pascal Lafourcade, Marine Minier & Christine Solnon - 2020 - Artificial Intelligence 278 (C):103183.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  2
    Analyzing the impact of bounded degree constraints on computational complexity of argumentation frameworks.Mohammed Elaroussi - 2025 - Argument and Computation 16 (1).
    This research explores the relationship between the bounded in-degree and out-degree of an argumentation framework and the computational complexity of the problems of Credulous Acceptance ( CredA ) and Skeptical Acceptance ( SkepA ) under preferred extensions. Researchers have studied the complexity of these problems when the in-degree [Formula: see text] and out-degree [Formula: see text] of the arguments are restricted to [Formula: see text]. Despite this restriction, the computational complexities of CredA and SkepA persist. Based on these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  22
    (1 other version)Canalization of Language Structure From Environmental Constraints: A Computational Model of Word Learning From Multiple Cues.Padraic Monaghan - 2016 - Topics in Cognitive Science 8 (4).
    There is substantial variation in language experience, yet there is surprising similarity in the language structure acquired. Constraints on language structure may be external modulators that result in this canalization of language structure, or else they may derive from the broader, communicative environment in which language is acquired. In this paper, the latter perspective is tested for its adequacy in explaining robustness of language learning to environmental variation. A computational model of word learning from cross-situational, multimodal information was (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. Topics in Constraint Grammar Formalism for Computational Linguistics (SfS Report 4-95).J. Griffith (ed.) - 1995 - Tübingen: Seminar für Sprachwissenschaft, Eberhard-Karls-Universität.
     
    Export citation  
     
    Bookmark  
  21.  34
    Balancing information-structure and semantic constraints on construction choice: building a computational model of passive and passive-like constructions in Mandarin Chinese.Ben Ambridge & Li Liu - 2021 - Cognitive Linguistics 32 (3):349-388.
    A central tenet of cognitive linguistics is that adults’ knowledge of language consists of a structured inventory of constructions, including various two-argument constructions such as the active, the passive and “fronting” constructions. But how do speakers choose which construction to use for a particular utterance, given constraints such as discourse/information structure and the semantic fit between verb and construction? The goal of the present study was to build a computational model of this phenomenon for two-argument constructions in Mandarin. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  10
    Computational Logic — CL 2000: First International Conference London, UK, July 24–28, 2000 Proceedings.John Lloyd, Veronica Dahl, Ulrich Furbach, Manfred Kerber, Kung-Kiu Lau, Catuscia Palamidessi, Luis M. Pereira, Yehoshua Sagiv & Peter J. Stuckey - 2000 - Springer Verlag.
    These are the proceedings of the First International Conference on Compu- tional Logic (CL 2000) which was held at Imperial College in London from 24th to 28th July, 2000. The theme of the conference covered all aspects of the theory, implementation, and application of computational logic, where computational logic is to be understood broadly as the use of logic in computer science. The conference was collocated with the following events: { 6th International Conference on Rules and Objects in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. Extending Ourselves: Computational Science, Empiricism, and Scientific Method.Paul Humphreys - 2004 - New York, US: Oxford University Press.
    Computational methods such as computer simulations, Monte Carlo methods, and agent-based modeling have become the dominant techniques in many areas of science. Extending Ourselves contains the first systematic philosophical account of these new methods, and how they require a different approach to scientific method. Paul Humphreys draws a parallel between the ways in which such computational methods have enhanced our abilities to mathematically model the world, and the more familiar ways in which scientific instruments have expanded our access (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   339 citations  
  24.  19
    Logic programs with abstract constraint atoms: The role of computations.Lengning Liu, Enrico Pontelli, Tran Cao Son & Miroslaw Truszczyński - 2010 - Artificial Intelligence 174 (3-4):295-315.
  25.  23
    Mathematical constraints on a theory of human memory - Response.S. Dennis, M. S. Humphreys & J. Wiles - 1996 - Behavioral and Brain Sciences 19 (3):559-560.
    Colonius suggests that, in using standard set theory as the language in which to express our computational-level theory of human memory, we would need to violate the axiom of foundation in order to express meaningful memory bindings in which a context is identical to an item in the list. We circumvent Colonius's objection by allowing that a list item may serve as a label for a context without being identical to that context. This debate serves to highlight the value (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Thagard. P.(1989). Analogical mapping by constraint satisfaction: a computational theory.K. Holyoak - 1996 - Cognitive Science 13.
     
    Export citation  
     
    Bookmark  
  27.  23
    On the computational complexity of querying bounds on differences constraints.Vittorio Brusoni, Luca Console & Paolo Terenziani - 1995 - Artificial Intelligence 74 (2):367-379.
  28.  72
    A Probabilistic Computational Model of Cross-Situational Word Learning.Afsaneh Fazly, Afra Alishahi & Suzanne Stevenson - 2010 - Cognitive Science 34 (6):1017-1063.
    Words are the essence of communication: They are the building blocks of any language. Learning the meaning of words is thus one of the most important aspects of language acquisition: Children must first learn words before they can combine them into complex utterances. Many theories have been developed to explain the impressive efficiency of young children in acquiring the vocabulary of their language, as well as the developmental patterns observed in the course of lexical acquisition. A major source of disagreement (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  29.  24
    Intelligent Computation Offloading for IoT Applications in Scalable Edge Computing Using Artificial Bee Colony Optimization.Mohammad Babar, Muhammad Sohail Khan, Ahmad Din, Farman Ali, Usman Habib & Kyung Sup Kwak - 2021 - Complexity 2021:1-12.
    Most of the IoT-based smart systems require low latency and crisp response time for their applications. Achieving the demand of this high Quality of Service becomes quite challenging when computationally intensive tasks are offloaded to the cloud for execution. Edge computing therein plays an important role by introducing low network latency, quick response, and high bandwidth. However, offloading computations at a large scale overwhelms the edge server with many requests and the scalability issue originates. To address the above issues, an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  23
    Constraints on Analogical Inference.Arthur B. Markman - 1997 - Cognitive Science 21 (4):373-418.
    The ability to reason by analogy is particularly important because it permits the extension of knowledge of a target domain by virtue of its similarity to a base domain via a process of analogical inference. The general procedure for analogical inference involves copying structure from the base to the target in which missing information is generated, and substitutions are made for items for which analogical correspondences have already been found. A pure copying with substitution and generation process is too profligate (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  31.  18
    Computation and Interpretation in Literary Studies.John Mulligan - 2021 - Critical Inquiry 48 (1):126-143.
    The article suggests that the best examples of textual work in the computational humanities are best understood as motivated by aesthetic concerns with the constraints placed on literature by computation’s cultural hegemony. To draw these concerns out, I adopt a middle-distant depth of field, examining the strange epistemology and unexpected aesthetic dimension of numerical culture’s encounters with literature. The middle-distant forms of reading I examine register problematically as literary scholarship not because they lack rigor or evidence but because (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  9
    Recent Advances in Constraints Joint Ercim/Colognet International Workshop on Constraint Solving and Constraint Logic Programming, Csclp 2003, Budapest, Hungary, June 30 - July 2, 2003 : Selected Papers.Krzysztof Apt, Francois Fages, Francesca Rossi, Peter Szeredi & Josef Váncza - 2004 - Springer Verlag.
    Constraint programming is the fruit of several decades of research carried out in mathematical logic, automated deduction, operations research and arti?cial intelligence. The tools and programming languages arising from this research?eldhaveenjoyedrealsuccessintheindustrialworldastheycontributetosolving hard combinatorial problems in diverse domains such as production planning, communication networks, robotics and bioinformatics. This volume contains the extended and reviewed versions of a selection of papers presented at the Joint ERCIM/CoLogNET International Workshop on Constraint Solving and Constraint Logic Programming, which was held from June 30 to July (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  31
    Sculpting Computational‐Level Models.Mark Blokpoel - 2018 - Topics in Cognitive Science 10 (3):641-648.
    In this commentary, I advocate for strict relations between Marr's levels of analysis. Under a strict relationship, each level is exactly implemented by the subordinate level. This yields two benefits. First, it brings consistency for multilevel explanations. Second, similar to how a sculptor chisels away superfluous marble, a modeler can chisel a computational-level model by applying constraints. By sculpting the model, one restricts the set of possible algorithmic- and implementational-level theories.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  34. Computational implications of gestalt theory: The role of feedback in visual processing.Steven Lehar - 2002
    Neurophysiological investigations of the visual system by way of single-cell recordings have revealed a hierarchical architecture in which lower level areas, such as the primary visual cortex, contain cells that respond to simple features, while higher level areas contain cells that respond to higher order features apparently composed of combinations of lower level features. This architecture seems to suggest a feed-forward processing strategy in which visual information progresses from lower to higher visual areas. However there is other evidence, both neurophysiological (...)
     
    Export citation  
     
    Bookmark  
  35.  27
    Structural constraints for dynamic operators in abstract argumentation.Johannes P. Wallner - 2020 - Argument and Computation 11 (1-2):151-190.
    Many recent studies of dynamics in formal argumentation within AI focus on the well-known formalism of Dung’s argumentation frameworks (AFs). Despite the usefulness of AFs in many areas of argumentation, their abstract notion of arguments creates a barrier for operators that modify a given AF, e.g., in the case that dependencies between arguments have been abstracted away that are important for subsequent modifications. In this paper we aim to support development of dynamic operators on formal models in abstract argumentation by (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  36.  58
    Coherence as Constraint Satisfaction.Paul Thagard & Karsten Verbeurgt - 1998 - Cognitive Science 22 (1):1-24.
    This paper provides a computational characterization of coherence that applies to a wide range of philosophical problems and psychological phenomena. Maximizing coherence is a matter of maximizing satisfaction of a set of positive and negative constraints. After comparing five algorithms for maximizing coherence, we show how our characterization of coherence overcomes traditional philosophical objections about circularity and truth.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   91 citations  
  37.  75
    Analogical Mapping by Constraint Satisfaction.Keith J. Holyoak & Paul Thagard - 1989 - Cognitive Science 13 (3):295-355.
    A theory of analogical mapping between source and target analogs based upon interacting structural, semantic, and pragmatic constraints is proposed here. The structural constraint of isomorphism encourages mappings that maximize the consistency of relational corresondences between the elements of the two analogs. The constraint of semantic similarity supports mapping hypotheses to the degree that mapped predicates have similar meanings. The constraint of pragmatic centrality favors mappings involving elements the analogist believes to be important in order to achieve the purpose (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   266 citations  
  38.  52
    The complexity of modellability in finite and computable signatures of a constraint logic for head-driven phrase structure grammar.Paul John King, Kiril Ivanov Simov & Bjørn Aldag - 1999 - Journal of Logic, Language and Information 8 (1):83-110.
    The SRL of King is a sound, complete and decidable logic designed specifically to support formalisms for the HPSG of Pollard and Sag. The SRL notion of modellability in a signature is particularly important for HPSG, and the present paper modifies an elegant method due to Blackburn and Spaan in order to prove that – modellability in each computable signature is 1 0 – modellability in some finite signature is 1 0 -hard, and – modellability in some finite signature is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. The Domain Constraint on Analogy and Analogical Argument.William R. Brown - 1995 - Informal Logic 17 (1).
    Domain constraint, the requirement that analogues be selected from "the same category," inheres in the popular saying "you can't compare apples and oranges" and the textbook principle "the greater the number of shared properties, the stronger the argument from analogy." I identify roles of domains in biological, linguistic, and legal analogy, supporting the account of law with a computer word search of judicial decisions. I argue that the category treatments within these disciplines cannot be exported to general informal logic, where (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  40.  89
    The very idea of computer self-knowledge and self-deception.Sanford C. Goldberg - 1997 - Minds and Machines 7 (4):515-529.
    Do computers have beliefs? I argue that anyone who answers in the affirmative holds a view that is incompatible with what I shall call the commonsense approach to the propositional attitudes. My claims shall be two. First,the commonsense view places important constraints on what can be acknowledged as a case of having a belief. Second, computers – at least those for which having a belief would be conceived as having a sentence in a belief box – fail to satisfy (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  21
    Topology optimization of computer communication network based on improved genetic algorithm.Kayhan Zrar Ghafoor, Jilei Zhang, Yuhong Fan & Hua Ai - 2022 - Journal of Intelligent Systems 31 (1):651-659.
    The topology optimization of computer communication network is studied based on improved genetic algorithm, a network optimization design model based on the establishment of network reliability maximization under given cost constraints, and the corresponding improved GA is proposed. In this method, the corresponding computer communication network cost model and computer communication network reliability model are established through a specific project, and the genetic intelligence algorithm is used to solve the cost model and computer communication network reliability model, respectively. It (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  17
    Algebra and computer science.Delaram Kahrobaei, Bren Cavallo & David Garber (eds.) - 2016 - Providence, Rhode Island: American Mathematical Society.
    This volume contains the proceedings of three special sessions: Algebra and Computer Science, held during the Joint AMS-EMS-SPM meeting in Porto, Portugal, June 10–13, 2015; Groups, Algorithms, and Cryptography, held during the Joint Mathematics Meeting in San Antonio, TX, January 10–13, 2015; and Applications of Algebra to Cryptography, held during the Joint AMS-Israel Mathematical Union meeting in Tel-Aviv, Israel, June 16–19, 2014. Papers contained in this volume address a wide range of topics, from theoretical aspects of algebra, namely group theory, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. The Swapping Constraint.Henry Ian Schiller - 2018 - Minds and Machines 28 (3):605-622.
    Triviality arguments against the computational theory of mind claim that computational implementation is trivial and thus does not serve as an adequate metaphysical basis for mental states. It is common to take computational implementation to consist in a mapping from physical states to abstract computational states. In this paper, I propose a novel constraint on the kinds of physical states that can implement computational states, which helps to specify what it is for two physical states (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  98
    Efficient Creativity: Constraint‐Guided Conceptual Combination.Fintan J. Costello & Mark T. Keane - 2000 - Cognitive Science 24 (2):299-349.
    This paper describes a theory that explains both the creativity and the efficiency of people's conceptual combination. In the constraint theory, conceptual combination is controlled by three constraints of diagnosticity, plausibility, and informativeness. The constraints derive from the pragmatics of communication as applied to compound phrases. The creativity of combination arises because the constraints can be satisfied in many different ways. The constraint theory yields an algorithmic model of the efficiency of combination. The C3 model admits the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   32 citations  
  45.  43
    The eri-designer: A computer model for the arrangement of furniture. [REVIEW]Santiago Negrete - 2010 - Minds and Machines 20 (4):533-564.
    This paper reports a computer program to generate novel designs for the arrangement of furniture within a simulated room. It is based on the engagement-reflection computer model of the creative processes. During engagement the system generates material in the form of sequences of actions (e.g. change the colours of the walls, include some furniture in the room, modify their colour, and so on) guided by content and knowledge constraints. During reflection, the system evaluates the composition produced so far and, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  46.  47
    Rethinking Causation for Data‐intensive Biology: Constraints, Cancellations, and Quantized Organisms.Douglas E. Brash - 2020 - Bioessays 42 (7):1900135.
    Complex organisms thwart the simple rectilinear causality paradigm of “necessary and sufficient,” with its experimental strategy of “knock down and overexpress.” This Essay organizes the eccentricities of biology into four categories that call for new mathematical approaches; recaps for the biologist the philosopher's recent refinements to the causation concept and the mathematician's computational tools that handle some but not all of the biological eccentricities; and describes overlooked insights that make causal properties of physical hierarchies such as emergence and downward (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Neural and super-Turing computing.Hava T. Siegelmann - 2003 - Minds and Machines 13 (1):103-114.
    ``Neural computing'' is a research field based on perceiving the human brain as an information system. This system reads its input continuously via the different senses, encodes data into various biophysical variables such as membrane potentials or neural firing rates, stores information using different kinds of memories (e.g., short-term memory, long-term memory, associative memory), performs some operations called ``computation'', and outputs onto various channels, including motor control commands, decisions, thoughts, and feelings. We show a natural model of neural computing that (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  48.  49
    Evolutionary Constraints on Human Object Perception.E. Koopman Sarah, Z. Mahon Bradford & F. Cantlon Jessica - 2017 - Cognitive Science:2126-2148.
    Language and culture endow humans with access to conceptual information that far exceeds any which could be accessed by a non-human animal. Yet, it is possible that, even without language or specific experiences, non-human animals represent and infer some aspects of similarity relations between objects in the same way as humans. Here, we show that monkeys’ discrimination sensitivity when identifying images of animals is predicted by established measures of semantic similarity derived from human conceptual judgments. We used metrics from computer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Integrating Physical Constraints in Statistical Inference by 11-Month-Old Infants.Stephanie Denison & Fei Xu - 2010 - Cognitive Science 34 (5):885-908.
    Much research on cognitive development focuses either on early-emerging domain-specific knowledge or domain-general learning mechanisms. However, little research examines how these sources of knowledge interact. Previous research suggests that young infants can make inferences from samples to populations (Xu & Garcia, 2008) and 11- to 12.5-month-old infants can integrate psychological and physical knowledge in probabilistic reasoning (Teglas, Girotto, Gonzalez, & Bonatti, 2007; Xu & Denison, 2009). Here, we ask whether infants can integrate a physical constraint of immobility into a statistical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  50. Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   20 citations  
1 — 50 / 971