Results for 'mobile agent, ubiquitous, web services, aspectj'

959 found
Order:
  1.  17
    ユビキタス環境下におけるモバイルエージェントアプリケーションの効率的開発手法.吉岡 信和 松崎 和賢 - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:311-321.
    A methodology which enables a flexible and reusable development of mobile agent application to a mobility aware indoor environment is provided in this study. The methodology is named Workflow-awareness model based on a concept of a pair of mobile agents cooperating to perform a given task. A monolithic mobile agent application with numerous concerns in a mobility aware setting is divided into a master agent and a shadow agent according to a type of tasks. The MA executes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  27
    ユビキタス環境と Web サービスを仲介するミドルエージェントの開発.Nakaido Takeshi Terasaki Tatsuya - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:343-350.
    According to the widespread use of Web Services, composition of multiple services is becoming a main issue. BPEL was proposed as a Web Services workflow language in this context. Then, in many cases we need much interactions between a service requester and a BPEL process execution engine. However for the end user under the ubiquitous environment where the service is executed with a cellular phone or PDA, the interaction means simply a burden. The reason is: (1)it is hard to carry (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  18
    ユビキタス計算環境におけるコンテンツ流通のためのマルチエージェントアーキテクチャ: Consorts.Izumi Noriaki Sashima Akio - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:322-333.
    In the vision of the semantic web, agents are defined as the programs that collect information from diverse sources, process the information, and exchange the results with other programs. In order to extend application areas of the agents from the Internet to the real world, we propose CONSORTS, a multiagent architecture for content managements in ubiquitous computing. In this paper, we, first, describe two important concepts in order to realize the agent-based content managements in ubiquitous computing, ``physically grounding'' and ``cognitive (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  28
    Kodama と vpc によるユビキタス環境のためのフレームワークの構築と評価.Amamiya Satoshi Takahashi Kenichi - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:300-310.
    Recently, agent technologies have attracted a lot of interest as an emerging programming paradigm. With such agent technologies, services are provided through collaboration among agents. At the same time, the spread of mobile technologies and communication infrastructures has made it possible to access the network anytime and from anywhere. Using agents and mobile technologies to realize ubiquitous computing systems, we propose a new framework based on KODAMA and VPC. KODAMA provides distributed management mechanisms by using the concept of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Entish: Agent Based Language for Web Service Integration.S. Ambroszkiewicz & T. Nowak - 2002 - In Robert Trappl (ed.), Cybernetics and Systems. Austrian Society for Cybernetics Studies. pp. 701--706.
     
    Export citation  
     
    Bookmark  
  6.  5
    Tangramob: An Agent-Based Simulation Framework for Validating Urban Smart Mobility Solutions.Giorgio Forcina, Jacopo de Berardinis, Carlo Castagnari, Andrea Polini, Francesco De Angelis & Flavio Corradini - 2019 - Journal of Intelligent Systems 29 (1):1188-1201.
    Estimating the effects of introducing a range of smart mobility solutions within an urban area is a crucial concern in urban planning. The lack of a simulator for the assessment of mobility initiatives forces local public authorities and mobility service providers to base their decisions on guidelines derived from common heuristics and best practices. These approaches can help planners in shaping mobility solutions; however, given the high number of variables to consider, the effects are not guaranteed. Therefore, a solution conceived (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Workshop on Information Systems Information Technologies (ISIT 2006)-Scalable Mobile Internet Servers: Selecting Useful Images from the Web for Mobile Services.DaeHyuck Park, Maria Hong, Euisun Kang, Seongjin Ahn, YoungSong Mun & YoungHwan Lim - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 400-409.
  8.  19
    A policy-based B2C e-Contract management workflow methodology using semantic web agents.Kalliopi Kravari, Nick Bassiliades & Guido Governatori - 2016 - Artificial Intelligence and Law 24 (2):93-131.
    Since e-Commerce has become a discipline, e-Contracts are acknowledged as the tools that will assure the safety and robustness of the transactions. A typical e-Contract is a binding agreement between parties that creates relations and obligations. It consists of clauses that address specific tasks of the overall procedure which can be represented as workflows. Similarly to e-Contracts, Intelligent Agents manage a private policy, a set of rules representing requirements, obligations and restrictions, additionally to personal data that meet their user’s interests. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  67
    Federated identity management in mobile dynamic virtual organizations.Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou - 2009 - Identity in the Information Society 2 (2):115-136.
    Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  10.  17
    Mobilizing Gendered Piety in Sri Lanka’s Contemporary Bhikkhun? Ordination Dispute.Tyler A. Lehrer - 2019 - Buddhist Studies Review 36 (1):99-121.
    Since the late 1980s, in defiance of Sri Lanka’s major monastic fraternities and the government, Buddhist women and men have begun to organize across distinctions of national boundary and Buddhist tradition to reinstate a defunct bhikkhun? ordination lineage for renunciant women. Drawing on fieldwork from the winter of 2015–16, this article considers some of the strategies by which Sri Lanka’s bhikkhun?s and their supporters constitute the burgeoning lineage as both legitimate and necessary for the continued health and vitality of an (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  20
    Optimization of Internet of Things E-Commerce Logistics Cloud Service Platform Based on Mobile Communication.Jun Chen, Huan Wu, Xi Zhou, Maoguo Wu, Chenyang Zhao & Shiyan Xu - 2021 - Complexity 2021:1-11.
    E-commerce conceivable future trade, consumption, and service is a new digital employer mode. Therefore, in order to decorate the customary natural environment of operation, it is quintessential to get rid of the preferred desktop in the true field, create a social logistics and transportation administration computing device with commodity agents and distributors as the key features, and mix freight logistics, business enterprise approach waft and data waft advertising and marketing, and advertising and marketing organically. The notion of e-commerce logistics looks (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  32
    BisNet: Web ブラウザのブックマーク機能を利用した情報共有システム.Sayama Hiroki Sano Koji - 2005 - Transactions of the Japanese Society for Artificial Intelligence 20:281-288.
    We propose a new information sharing system, named ``BisNet'', which automatically gathers information about the bookmarks stored in users' web browsers and helps the users exchange URIs of possibly interesting web pages with others who have similar interest with them. Being different from other typical agent services that gather and provide information according to pre-registered user profiles, BisNet is expected to share more relevant information because of its use of web browser bookmarks that are actively selected and ordered by many (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  13
    Gender and interface agents in the on-line news.Pekka Isotalus - 2009 - Communications 34 (1):39-53.
    Interface agents are increasingly being used to enhance the user-friendliness of computers. In the new mobile technology of handheld computers, interface agents are also being used to present on-line news. The purpose of the study was to explore how the gender of the interface agent and the user affect evaluations of the agent and the news service. The results revealed that attitudes toward the interface agent significantly correlated with evaluations of the entire news service. Moreover, the gender of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  11
    Let's talk about our “being”: A linguistic-based ontology framework for coordinating agents.Maria Teresa Pazienza, Savino Sguera & Armando Stellato - 2007 - Applied ontology 2 (3-4):305-332.
    In open scenarios, agents willing to cooperate must impact the communication barrier between them and their unknown partners. If agents are not relying on any agreement about the meaning they ascribe to the symbols used in the conversation, semantic misalignments will arise on the discourse domain as well, thus making the communication impossible. In wide and heterogeneous scenarios offered by the Web (and its newborn semantic incarnation), traditional and meaning-safe methodologies for communication need to keep abreast of new dynamic communicative (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  73
    Effectiveness of Mobile App-Based Psychological Interventions for College Students: A Systematic Review of the Literature.Carla Oliveira, Anabela Pereira, Paula Vagos, Catarina Nóbrega, José Gonçalves & Beatriz Afonso - 2021 - Frontiers in Psychology 12.
    Serious mental health disorders are increasing among college students and university counseling services are often overburdened. Mobile applications for mental health have been growing exponentially in the last decade and they are emerging in university settings as a promising tool to promote and intervene in college students' mental health. Additionally, considering the recent covid-19 pandemic, mHealth interventions, due to its nature and possibilities, may play an important role in these institutions. Our main objectives are to explore mhealth interventions in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  67
    Web Service Modeling Ontology.Dumitru Roman, Uwe Keller, Holger Lausen, Jos de Bruijn, Rubén Lara, Michael Stollberg, Axel Polleres, Cristina Feier, Cristoph Bussler & Dieter Fensel - 2005 - Applied ontology 1 (1):77-106.
    The potential to achieve dynamic, scalable and cost-effective marketplaces and eCommerce solutions has driven recent research efforts towards so-called Semantic Web Services that are enriching Web services with machine-processable semantics. To this end, the Web Service Modeling Ontology (WSMO) provides the conceptual underpinning and a formal language for semantically describing all relevant aspects of Web services in order to facilitate the automatization of discovering, combining and invoking electronic services over the Web. In this paper we describe the overall structure of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  80
    Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.Josué Toledo-Castro, Pino Caballero-Gil, Nayra Rodríguez-Pérez, Iván Santos-González, Candelaria Hernández-Goya & Ricardo Aguasca-Colomo - 2018 - Complexity 2018:1-17.
    Huge losses and serious threats to ecosystems are common consequences of forest fires. This work describes a forest fire controller based on fuzzy logic and decision-making methods aiming at enhancing forest fire prevention, detection, and fighting systems. In the proposal, the environmental monitoring of several dynamic risk factors is performed with wireless sensor networks and analysed with the proposed fuzzy-based controller. With respect to this, meteorological variables, polluting gases and the oxygen level are measured in real time to estimate the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  16
    Towards a semantic blockchain: A behaviouristic approach to modelling Ethereum.Giampaolo Bella, Domenico Cantone, Marianna Nicolosi Asmundo & Daniele Francesco Santamaria - 2024 - Applied ontology 19 (2):143-180.
    Decentralised ledgers are gaining momentum following the interest of industries and people in smart contracts. Major attention is paid to blockchain applications intended for trading assets that exploit digital cryptographic certificates called tokens. Particularly relevant tokens are the non-fungible tokens (NFTs), namely, unique and non-replicable tokens used to represent the cryptographic counterpart of assets ranging from pieces of art through to licenses and certifications. A relevant consequence of the hard-coded nature of blockchains is the hardness of probing, in particular when (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  8
    Three Months in the Confederate Army.Henry Hotze - 2003 - University Alabama Press.
    Confederate service, Confederate propaganda. Although not born in the South, Henry Hotze's devotion to the cause of the Confederacy was as ardent as that of any native secessionist. As a member of the Mobile Cadets, an elite volunteer company of the Gulf City, Hotze was ordered to Virginia at the start of war as part of the Third Alabama Regiment. He distinguished himself in many ways, primarily off the battlefield as a clerk and European go-between. In November of 1861, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20. Legal aspects of mobile agents. With special consideration of the proposed Austrian E-Commerce Law.M. Sonntag - 2002 - In Robert Trappl (ed.), Cybernetics and Systems. Austrian Society for Cybernetics Studies. pp. 153--158.
     
    Export citation  
     
    Bookmark  
  21. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  38
    Distributed Testing System for Web Service Based on Crowdsourcing.Xiaolong Liu, Yun-Ju Hsieh, Riqing Chen & Shyan-Ming Yuan - 2018 - Complexity 2018:1-15.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  20
    Automated composition of Web services via planning in asynchronous domains.Piergiorgio Bertoli, Marco Pistore & Paolo Traverso - 2010 - Artificial Intelligence 174 (3-4):316-361.
  24.  31
    Formation Tracking of Heterogeneous Mobile Agents Using Distance and Area Constraints.E. G. Hernandez-Martinez, E. D. Ferreira-Vazquez, G. Fernandez-Anaya & J. J. Flores-Godoy - 2017 - Complexity:1-13.
    This paper presents two formation tracking control strategies for a combined set of single and double integrator agents with an arbitrary undirected communication topology. The first approach is based on the design of distance-based potential functions with interagent collision avoidance using local information about the distance and orientation between agents and the desired trajectory. The second approach adds signed area constraints to the desired formation specification and a control strategy that uses distance as well as area terms is designed to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  14
    John Kinsella as life writer: The poetics of dirt.David McCooey - 2021 - Angelaki 26 (2):92-103.
    Life writing is ubiquitous in John Kinsella’s vast oeuvre. Kinsella’s employment of the diversity of modes collected under the rubric of “life writing” is underpinned by a “poetics of dirt.” Such a poetics is visible in the central role that material dirt plays in Kinsella’s work, as well as the more general concept of impurity, as seen in Kinsella’s poetic trafficking in ideas concerning transgression, liminality, hybridity, and danger. In Purity and Danger, the anthropologist Mary Douglas famously defined dirt as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  16
    The Construction of a Personalised and Social U-Learning Environment for Third Level Education.Olapeju Latifat Ayoola & Eleni Mangina - 2012 - International Journal of Cyber Ethics in Education 2 (3):45-56.
    This paper presents a ubiquitous learning system, the “Personalised Ubiquitous Learning Platform”, which integrates collaborative and social learning for the enhancement of the third level educational learning experience. University College Dublin provides its students with managed learning environments and adaptive learning via UCD Horizon which enables students to take different courses from different colleges throughout the university. The main objective of this platform is to complement the current MLEs with a single supported intelligent and personalised ubiquitous learning environment that will (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27. Communications Systems and Networks-Web Service Based Inter-AS Connection Managements for QoS-Guaranteed DiffServ Provisioning.Young-Tak Kim & Hyun-Ho Shin - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 3647--248.
  28. Researching Innovative Educational Practices: Experiences of mobile and ubiquitous technologies.Sadaf Salavati and Christina Mörtberg - 2014 - Iris 35.
    No categories
     
    Export citation  
     
    Bookmark  
  29. Film as a mobilizing agent? Adorno and Benjamin on aesthetic experience.Gaye Ilhan Demiryol - 2012 - Philosophy and Social Criticism 38 (9):939-954.
    This article evaluates the role of art – particularly mechanically reproduced forms of art – in the writings of Walter Benjamin and Theodor W. Adorno. The central claim is that both thinkers share the same conviction as to the emancipatory potentials of the work of art. Yet, they evaluate the effects of technological innovation differently. The underpinnings of this later resolved discord, however, are philosophical. In contrast to Benjamin’s belief in the possibility of mass mobilization, for Adorno the relevant category (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  28
    Rationing of nursing care, a deviation from holistic nursing: A systematic review.Lata Mandal, Avudaiappan Seethalakshmi & Anitha Rajendrababu - 2020 - Nursing Philosophy 21 (1):e12257.
    BackgroundRationing of care in nursing is nurses' inability to complete all care activities for patients because of scarcity in time and resource. Literature suggests that rationing of care is closely related to patient safety and quality of care. The phenomena have been defined and studied from varied perspectives and contexts. A systematic review of studies related to the concept was aimed at identifying and synthesizing the finding.MethodsThe review followed Preferred Reporting Items for Systematic Reviews and Meta‐analysis guidelines, and literature searches (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Agents in branching space-times.Nuel Belnap - manuscript
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Discovery of Web Services Applied to Scientific Computations Based on QOS.Han Cao, Daxin Liu & Rui Fu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 3842--919.
     
    Export citation  
     
    Bookmark  
  33.  29
    Location-Aware Web Service Composition Based on the Mixture Rank of Web Services and Web Service Requests.Junwen Lu, Guanfeng Liu, Keshou Wu & Wenjiang Qin - 2019 - Complexity 2019:1-16.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Component Composition Based on Web Service and Software Architecture.Xin Wang, Changsong Sun, Xiaojian Liu & Bo Xu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 987-990.
     
    Export citation  
     
    Bookmark  
  35. Analytic cut-free tableaux for regular modal logics of agent beliefs.Rajeev Gore - manuscript
  36. Prototyping a Browser for a Listed Buildings Database with Semantic MediaWiki.Michael Kohlhase - unknown
    Listed buildings, even if they are not top landmarks, are increasingly attracting visitors. People express interest in hidden gems in their neighborhood or along their travel itinerary, and in the history of the building they live in. All required data has been meticulously collected by the offices for historical monuments but is not flexibly accessible. In Bremen, the database of buildings (with location, map of the estate, construction history, architect, photos) is searchable and browsable online3, but that only helps users (...)
    No categories
     
    Export citation  
     
    Bookmark  
  37. Money as Media: Gilson Schwartz on the Semiotics of Digital Currency.Renata Lemos-Morais - 2011 - Continent 1 (1):22-25.
    continent. 1.1 (2011): 22-25. The Author gratefully acknowledges the financial support of CAPES (Coordenação de Aperfeiçoamento do Ensino Superior), Brazil. From the multifarious subdivisions of semiotics, be they naturalistic or culturalistic, the realm of semiotics of value is a ?eld that is getting more and more attention these days. Our entire political and economic systems are based upon structures of symbolic representation that many times seem not only to embody monetary value but also to determine it. The connection between monetary (...)
     
    Export citation  
     
    Bookmark  
  38.  24
    The Usages of Internet and New Media by the Romanian Seventh-Day Adventist Clergy.Mihaela-Alexandra Tudor & Agnos-Millian Herteliu - 2016 - Journal for the Study of Religions and Ideologies 15 (45):207-233.
    This article highlights how Internet and new media are experienced by Romanian Seventh-Day Adventist pastors in their ministry. What is the acceptance of Web 2.0 services for neo-Protestant pastors of the Seventh-Day Adventist Church, what uses of these technologies they make in their work, what is their mobilization for the appropriation of an innovative culture in the daily pastoral work, how these uses allow them to manage their religious activity, these are the main questions of a survey we conducted in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. The intelligent room project.Rodney A. Brooks - unknown
    At the MIT Arti cial Intelligence Laboratory we have been working on technologies for an Intelligent Room. Rather than pull people into the virtual world of the computer we are trying to pull the computer out into the real world of people. To do this we are combining robotics and vision technology with speech understanding systems, and agent based architectures to provide ready at hand computation and information services for people engaged in day to day activities, both on their own (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  36
    Formalization of Mathematical Proof Practice Through an Argumentation-Based Model.Sofia Almpani, Petros Stefaneas & Ioannis Vandoulakis - 2023 - Axiomathes 33 (3):1-28.
    Proof requires a dialogue between agents to clarify obscure inference steps, fill gaps, or reveal implicit assumptions in a purported proof. Hence, argumentation is an integral component of the discovery process for mathematical proofs. This work presents how argumentation theories can be applied to describe specific informal features in the development of proof-events. The concept of proof-event was coined by Goguen who described mathematical proof as a public social event that takes place in space and time. This new meta-methodological concept (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  61
    Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services, and (4) use (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Even good bots fight: the case of Wikipedia.Milena Tsvetkova, Ruth García-Gavilanes, Luciano Floridi & Taha Yasseri - 2017 - PLoS ONE 12 (2).
    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  26
    A calculus for orchestration of web services.Rosario Pugliese & Francesco Tiezzi - 2012 - Journal of Applied Logic 10 (1):2-31.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Researching Innovative Educational Practices: Experiences of mobile and ubiquitous technologies.Sadaf Salavati & Christina Mörtberg - 2014 - Iris 35.
    No categories
     
    Export citation  
     
    Bookmark  
  45. Feeling for others: Empathy and sympathy as sources of moral motivation.Heidi Maibom - manuscript
    According to the Humean theory of motivation, we only have a reason to act if we have both a belief and a pro-attitude. When it comes to moral reasons, it matters a great deal what that pro-attitude is; pure self-interest cannot combine with a belief to form a moral reason. A long tradition regards empathy and sympathy as moral motivators, and recent psychological evidence supports this view. I examine what I take to be the most plausible version of this claim: (...)
     
    Export citation  
     
    Bookmark  
  46.  26
    Transhumance in Central Anatolia: A Resilient Interdependence Between Biological and Cultural Diversity.Sezen Ocak - 2016 - Journal of Agricultural and Environmental Ethics 29 (3):439-453.
    Transhumance is a resource efficient means of livestock production by seasonally moving grazing animals to utilize pastures between varying ecological zones. This article investigated the interrelationship between the environmental services the transhumant provides whilst maintaining its cultural heritage and theorized what the cultural and environmental impacts would be if the practice of transhumance were to vanish. The authors interviewed 45 transhumant families during their 2015 seasonal migration through the Taurus Mountains and in their settled tent sites in Central Anatolia. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  29
    Sustaining Continuous Engagement in Value Co-creation Among Individuals in Universities Using Online Platforms: Role of Knowledge Self-Efficacy, Commitment and Perceived Benefits.Nabil Hasan Al-Kumaim, Abdulsalam K. Alhazmi, T. Ramayah, Muhammad Salman Shabbir & Nadhmi A. Gazem - 2021 - Frontiers in Psychology 12.
    Value Co-Creation plays a major role in engaging knowledgeable individuals in a community via innovation, problem solving, and new service/product development. This study investigates the personal factors that influence individuals’ engagement in value co-creation in Higher Education Institutions through the use of online platforms. Some higher education institutions have successfully established or used appropriate online platforms, such as online forums, web applications, and mobile applications to engage their community in ideation or crowdsourcing as a part of the value co-creation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48. How to be a relativist.Kenneth Taylor - manuscript
    Moral relativism is often rejected on grounds that it is either descriptively inadequate, at best, or self-defeating, at worst. In this essay, I swim against the predominant anti-relativistic philosophical tide. My minimal aim is to show that relativism is neither descriptively inadequate nor self-defeating. My maximal aim is to outline the beginnings of an argument that relativism is a truth resting on deep facts about the human normative predicament. And I shall suggest that far from being a source of cultural (...)
     
    Export citation  
     
    Bookmark  
  49. Privacy and artificial agents, or, is google reading my email?Samir Chopra & Laurence White - manuscript
    in Proceedings of the International Joint Conference on Artificial Intelligence, 2007.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. THIS IS NICE OF YOU. Introduction by Ben Segal.Gary Lutz - 2011 - Continent 1 (1):43-51.
    Reproduced with the kind permission of the author. Currently available in the collection I Looked Alive . © 2010 The Brooklyn Rail/Black Square Editions | ISBN 978-1934029-07-7 Originally published 2003 Four Walls Eight Windows. continent. 1.1 (2011): 43-51. Introduction Ben Segal What interests me is instigated language, language dishabituated from its ordinary doings, language startled by itself. I don't know where that sort of interest locates me, or leaves me, but a lot of the books I see in the stores (...)
     
    Export citation  
     
    Bookmark  
1 — 50 / 959