Search results for 'Validation and Verification' (try it on Scholar)

1000+ found
Sort by:
  1. Naomi Oreskes, Kristin Shrader-Frechette & Kenneth Belitz (1994). Verification, Validation, and Confirmation of Numerical Models in the Earth Sciences. Science 263 (5147):641-646.score: 96.0
    Verification and validation of numerical models of natural systems is impossible. This is because natural systems are never closed and because model results are always nonunique. Models can be confirmed by the demonstration of agreement between observation and prediction, but confirmation is inherently partial. Complete confirmation is logically precluded by the fallacy of affirming the consequent and by incomplete access to natural phenomena. Models can only be evaluated in relative terms, and their predictive value is always open to (...)
    No categories
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  2. Gordana Dodig-Crnkovic (2008). Empirical Modeling and Information Semantics. Mind & Society 7 (2):157.score: 48.0
    This paper investigates the relationship between reality and model, information and truth. It will argue that meaningful data need not be true in order to constitute information. Information to which truth-value cannot be ascribed, partially true information or even false information can lead to an interesting outcome such as technological innovation or scientific breakthrough. In the research process, during the transition between two theoretical frameworks, there is a dynamic mixture of old and new concepts in which truth is not well (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  3. David J. Kijowski, Harry Dankowicz & Michael C. Loui (2013). Observations on the Responsible Development and Use of Computational Models and Simulations. Science and Engineering Ethics 19 (1):63-81.score: 48.0
    Most previous works on responsible conduct of research have focused on good practices in laboratory experiments. Because computation now rivals experimentation as a mode of scientific research, we sought to identify the responsibilities of researchers who develop or use computational modeling and simulation. We interviewed nineteen experts to collect examples of ethical issues from their experiences in conducting research with computational models. We gathered their recommendations for guidelines for computational research. Informed by these interviews, we describe the respective professional responsibilities (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  4. Saikou Y. Diallo, Jose J. Padilla, Ross Gore, Heber Herencia‐Zapana & Andreas Tolk (2014). Toward a Formalism of Modeling and Simulation Using Model Theory. Complexity 19 (3):56-63.score: 48.0
    No categories
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  5. Joeri Engelfriet, Catholijn M. Jonker & Jan Treur (2002). Compositional Verification of Multi-Agent Systems in Temporal Multi-Epistemic Logic. Journal of Logic, Language and Information 11 (2):195-225.score: 30.0
    Compositional verification aims at managing the complexity of theverification process by exploiting compositionality of the systemarchitecture. In this paper we explore the use of a temporal epistemiclogic to formalize the process of verification of compositionalmulti-agent systems. The specification of a system, its properties andtheir proofs are of a compositional nature, and are formalized within acompositional temporal logic: Temporal Multi-Epistemic Logic. It isshown that compositional proofs are valid under certain conditions.Moreover, the possibility of incorporating default persistence ofinformation in a (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  6. Kenneth J. Shapiro (1986). Verification: Validity or Understanding. Journal of Phenomenological Psychology 17 (2):167-179.score: 30.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  7. Franck Varenne (2001). What Does a Computer Simulation Prove? The Case of Plant Modeling at CIRAD. In N. Giambiasi & C. Frydman (eds.), Simulation in industry - ESS 2001, Proc. of the 13th European Simulation Symposium. Society for Computer Simulation (SCS).score: 24.0
    The credibility of digital computer simulations has always been a problem. Today, through the debate on verification and validation, it has become a key issue. I will review the existing theses on that question. I will show that, due to the role of epistemological beliefs in science, no general agreement can be found on this matter. Hence, the complexity of the construction of sciences must be acknowledged. I illustrate these claims with a recent historical example. Finally I temperate (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  8. Luciano Floridi (2011). Semantic Information and the Correctness Theory of Truth. Erkenntnis 74 (2):147-175.score: 24.0
    Semantic information is usually supposed to satisfy the veridicality thesis: p qualifies as semantic information only if p is true. However, what it means for semantic information to be true is often left implicit, with correspondentist interpretations representing the most popular, default option. The article develops an alternative approach, namely a correctness theory of truth (CTT) for semantic information. This is meant as a contribution not only to the philosophy of information but also to the philosophical debate on the nature (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  9. Pepijn Visser, Trevor Bench-Capon & Jaap van den Herik (1997). A Method for Conceptualising Legal Domains. An Example From the Dutch Unemployment Benefits Act. Artificial Intelligence and Law 5 (3):207-242.score: 24.0
    There has been much talk of the need to build intermediate models of the expertise required preparatory to constructing a knowledge-based system in the legal domain. Such models offer advantages for verification, validation, maintenance and reuse. As yet, however, few such models have been reported at a useful level of detail. In this paper we describe a method for conceptualising legal domains as well as its application to a substantial fragment of the Dutch Unemployment Benefits Act (DUBA).We first (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  10. Louis J. Gross (2013). Selective Ignorance and Multiple Scales in Biology: Deciding on Criteria for Model Utility. [REVIEW] Biological Theory 8 (1):74-79.score: 24.0
    Much of the scientific process involves “selective ignorance”: we include certain aspects of the systems we are considering and ignore others. This is inherent in the models that we utilize as proxies for biological systems. Our goal usually is to isolate components of these systems and consider them at only certain temporal and spatial scales. The scales and questions induce different metrics for what might be considered a “good” model. The study of mathematical and computational models is replete with differing (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  11. Barry Smith (2000). Logic and Formal Ontology. Manuscrito 23 (2):29-67.score: 24.0
    Logic for Husserl is a science of science, a science of what all sciences have in common in their modes of validation. Thus logic deals with universal laws relating to truth, to deduction, to verification and falsification, and with laws relating to theory as such, and to what makes for theoretical unity, both on the side of the propositions of a theory and on the side of the domain of objects to which these propositions refer. This essay presents (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  12. Paula S. Weber, James E. Weber, Bradley R. Sleeper & Ken L. Schneider (2004). Self-Efficacy Toward Service, Civic Participation and the Business Student: Scale Development and Validation. [REVIEW] Journal of Business Ethics 49 (4):359-369.score: 24.0
    This paper presents the development andvalidation of new measurement tools to exploreself-efficacy toward service and toward civicparticipation. We developed and administereda survey to 851 students in an AACSB-accreditedcollege of business at a comprehensive publicuniversity located in the Midwest. Traditionalscale development methodologies plusconfirmatory factor analysis and simultaneousfactor analysis in several populations wereused to analyze both a primary sample and aholdback sample. Results strongly support thevalidity and reliability of the surveyinstrument. Future use for the instrumentincludes verification of the effectiveness ofpedagogies designed (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  13. Yong Shik Hwang (2008). On the Basic Components of Knowledge Acquisition in Integral Theory. Proceedings of the Xxii World Congress of Philosophy 8:115-124.score: 24.0
    This paper is about comparison and appraisal of Ken Wilber’s theory of the “three components or strands of knowledge” set forth especially in his Eye to Eye and Mark Edwards’s “Integral Cycle of Knowledge” which attempts through its critique to integrate Wilber’s developmental and epistemological models. Realizing the problem of today’s scientism, Wilber introduces the concepts of the “three eyes”—the eye of flesh, of reason, and of contemplation—thusconceiving science in a broad sense. Then in order to secure verification of (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  14. Anna Szabolcsi, Lewis Bott & Brian McElree (2008). The Effect of Negative Polarity Items on Inference Verification. Journal of Semantics 25 (4):411-450.score: 22.0
    The scalar approach to negative polarity item (NPI) licensing assumes that NPIs are allowable in contexts in which the introduction of the NPI leads to proposition strengthening (e.g., Kadmon & Landman 1993, Krifka 1995, Lahiri 1997, Chierchia 2006). A straightforward processing prediction from such a theory is that NPI’s facilitate inference verification from sets to subsets. Three experiments are reported that test this proposal. In each experiment, participants evaluated whether inferences from sets to subsets were valid. Crucially, we manipulated (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  15. Timothy R. Colburn (1991). Program Verification, Defeasible Reasoning, and Two Views of Computer Science. Minds and Machines 1 (1):97-116.score: 18.0
    In this paper I attempt to cast the current program verification debate within a more general perspective on the methodologies and goals of computer science. I show, first, how any method involved in demonstrating the correctness of a physically executing computer program, whether by testing or formal verification, involves reasoning that is defeasible in nature. Then, through a delineation of the senses in which programs can be run as tests, I show that the activities of testing and formal (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  16. Uri Pincas (2011). Program Verification and Functioning of Operative Computing Revisited: How About Mathematics Engineering? [REVIEW] Minds and Machines 21 (2):337-359.score: 18.0
    The issue of proper functioning of operative computing and the utility of program verification, both in general and of specific methods, has been discussed a lot. In many of those discussions, attempts have been made to take mathematics as a model of knowledge and certitude achieving, and accordingly infer about the suitable ways to handle computing. I shortly review three approaches to the subject, and then take a stance by considering social factors which affect the epistemic status of both (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  17. David A. Nelson (1992). Deductive Program Verification (a Practitioner's Commentary). Minds and Machines 2 (3):283-307.score: 18.0
    A proof of ‘correctness’ for a mathematical algorithm cannot be relevant to executions of a program based on that algorithm because both the algorithm and the proof are based on assumptions that do not hold for computations carried out by real-world computers. Thus, proving the ‘correctness’ of an algorithm cannot establish the trustworthiness of programs based on that algorithm. Despite the (deceptive) sameness of the notations used to represent them, the transformation of an algorithm into an executable program is a (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  18. Kathi Fisler (1999). Timing Diagrams: Formalization and Algorithmic Verification. [REVIEW] Journal of Logic, Language and Information 8 (3):323-361.score: 18.0
    Timing diagrams are popular in hardware design. They have been formalized for use in reasoning tasks, such as computer-aided verification. These efforts have largely treated timing diagrams as interfaces to established notations for which verification is decidable; this has restricted timing diagrams to expressing only regular language properties. This paper presents a timing diagram logic capable of expressing certain context-free and context-sensitive properties. It shows that verification is decidable for properties expressible in this logic. More specifically, it (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  19. Michael Riesen & Gursel Serpen (2008). Validation of a Bayesian Belief Network Representation for Posterior Probability Calculations on National Crime Victimization Survey. Artificial Intelligence and Law 16 (3):245-276.score: 18.0
    This paper presents an effort to induce a Bayesian belief network (BBN) from crime data, namely the national crime victimization survey (NCVS). This BBN defines a joint probability distribution over a set of variables that were employed to record a set of crime incidents, with particular focus on characteristics of the victim. The goals are to generate a BBN to capture how characteristics of crime incidents are related to one another, and to make this information available to domain specialists. The (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  20. Martin Kavka (2012). Verification (Bewahrung) in Martin Buber. Journal of Jewish Thought and Philosophy 20 (1):71-98.score: 18.0
    Abstract The work of Martin Buber oscillates between talk in which transcendence is experienced and talk in which transcendence is merely postulated. In order to show and mend this incoherence in Buber's thought, this essay attends to the rhetoric of verification ( Bewährung ), primarily but not solely in I and Thou (1923), both in order to show how it is a symptom of this incoherence, and also to show a broad pragmatic strain in Buber's thought. Given this pragmatic (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  21. Antonio Escobar, Marta González, José Ma Quintana, Amaia Bilbao & Berta Ibañez (2009). Validation of a Prioritization Tool for Patients on the Waiting List for Total Hip and Knee Replacements. Journal of Evaluation in Clinical Practice 15 (1):97-102.score: 18.0
    RATIONALE AND AIMS: Total hip and knee replacements, usually, have long waiting lists. There are several prioritization tools for these kind of patients. A new tool should undergo a standardized validation process. The aim of the present study was to validate a new prioritization tool for primary hip and knee replacements. METHODS: We carried out a prospective study. Consecutive patients placed on the waiting list were eligible for the study. Patients included were mailed a questionnaire which included, among other (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  22. Jan Van den Stock Beatrice de Gelder (2011). The Bodily Expressive Action Stimulus Test (BEAST). Construction and Validation of a Stimulus Basis for Measuring Perception of Whole Body Expression of Emotions. Frontiers in Psychology 2.score: 18.0
    Whole body expressions are among the main visual stimulus categories that are naturally associated with faces and the neuroscientific investigation of how body expressions are processed has entered the research agenda this last decade. Here we describe the stimulus set of whole body expressions termed Bodily Expressive Action Stimulus Test (BEAST), and we provide validation data for use of these materials by the community of emotion researchers. The database was composed by 254 whole body expressions resulting from 46 actors (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  23. Seana Coulson Jennifer Collins, Diane Pecher, René Zeelenberg (2011). Modality Switching in a Property Verification Task: An ERP Study of What Happens When Candles Flicker After High Heels Click. Frontiers in Psychology 2.score: 18.0
    The perceptual modalities associated with property words, such as flicker or click, have previously been demonstrated to affect subsequent property verification judgments (Pecher et al., 2003). Known as the conceptual modality switch effect, this finding supports the claim that brain systems for perception and action help subserve the representation of concepts. The present study addressed the cognitive and neural substrate of this effect by recording event-related potentials (ERPs) as participants performed a property verification task with visual or auditory (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  24. Guangyu Chen, Hong-Ying Zhang, Chunming Xie, Gang Chen, Zhi-Jun Zhang, Gao-Jun Teng & Shi-Jiang Li (2013). Modular Reorganization of Brain Resting State Networks and its Independent Validation in Alzheimer's Disease Patients. Frontiers in Human Neuroscience 7.score: 16.0
    Previous studies have demonstrated disruption in structural and functional connectivity occurring in the Alzheimer’s Disease (AD). However, it is not known how these disruptions alter brain network reorganization. With the modular analysis method of graph theory, and datasets acquired by the resting-state functional connectivity MRI (R-fMRI) method, we investigated and compared the brain organization patterns between the AD group and the cognitively normal control (CN) group. Our main finding is that the largest homotopic module (defined as the insula module) in (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  25. James H. Fetzer (1991). Philosophical Aspects of Program Verification. Minds and Machines 1 (2):197-216.score: 15.0
    A debate over the theoretical capabilities of formal methods in computer science has raged for more than two years now. The function of this paper is to summarize the key elements of this debate and to respond to important criticisms others have advanced by placing these issues within a broader context of philosophical considerations about the nature of hardware and of software and about the kinds of knowledge that we have the capacity to acquire concerning their performance.
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  26. J. W. Meiland (1966). Analogy, Verification, and Other Minds. Mind 75 (October):564-568.score: 15.0
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  27. Rick Dale & Nicholas D. Duran (2011). The Cognitive Dynamics of Negated Sentence Verification. Cognitive Science 35 (5):983-996.score: 15.0
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  28. John O. Nelson (1963). The Validation of Memory and Our Conception of a Past. Philosophical Review 72 (January):35-47.score: 15.0
  29. Jen‐Chieh Lin & Wei‐Chu Chie (2010). Psychometric Validation of the Taiwan Chinese Version of the 25‐Item National Eye Institute Visual Functioning Questionnaire. Journal of Evaluation in Clinical Practice 16 (5):1024-1024.score: 15.0
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  30. Geert M. J. Rutten, Janneke Harting, Stephen T. J. Rutten, Geertruida E. Bekkering & Stef P. J. Kremers (2006). Measuring Physiotherapists' Guideline Adherence by Means of Clinical Vignettes: A Validation Study. Journal of Evaluation in Clinical Practice 12 (5):491-500.score: 15.0
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  31. Valmi D. Sousa & Wilaiporn Rojjanasrirat (2011). Translation, Adaptation and Validation of Instruments or Scales for Use in Cross‐Cultural Health Care Research: A Clear and User‐Friendly Guideline. Journal of Evaluation in Clinical Practice 17 (2):268-274.score: 15.0
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  32. Norman H. Anderson (1974). Cross-Task Validation of Functional Measurement Using Judgments of Total Magnitude. Journal of Experimental Psychology 102 (2):226.score: 15.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  33. Francien Dechesne & Yanjing Wang (2010). To Know or Not to Know: Epistemic Approaches to Security Protocol Verification. Synthese 177 (Supplement-1):51-76.score: 15.0
    Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the agents. Since BAN-logic, there have been several initiatives and attempts to incorpórate epistemics into the analysis of security protocols. In this paper, we give an overview of work in the field and present it in a unified perspective, with comparisons on technical subtleties that have been employed in different approaches. Also, we study to which degree the use of epistemics is essential for the analysis of security (...)
    No categories
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  34. Shelton Macleod (1952). A Construction and Attempted Validation of Sensory Sweetness Scales. Journal of Experimental Psychology 44 (5):316.score: 15.0
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  35. Albert S. Rodwan (1964). An Empirical Validation of the Concept of Coherence. Journal of Experimental Psychology 68 (2):167.score: 15.0
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  36. Boris Tilov, Donka Dimitrova, Maria Stoykova, Bianka Tornjova, Gergana Foreva & Drozdstoj Stoyanov (2012). Cross‐Cultural Validation of the Revised Temperament and Character Inventory in the Bulgarian Language. Journal of Evaluation in Clinical Practice 18 (6):1180-1185.score: 15.0
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  37. Juan E. Mezzich, Neal L. Cohen, Maria A. Ruiperez, Claudio E. M. Banzato & Maria I. Zapata‐Vega (2011). The Multicultural Quality of Life Index: Presentation and Validation. Journal of Evaluation in Clinical Practice 17 (2):357-364.score: 15.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  38. Evridiki Papastavrou, Chrysoula Karlou, Haritini Tsangari, Georgios Efstathiou, Valmi D. Sousa, Anastasios Merkouris & Elisabeth Patiraki (2011). Cross‐Cultural Validation and Psychometric Properties of the Greek Version of the Caring Behaviors Inventory: A Methodological Study. Journal of Evaluation in Clinical Practice 17 (3):435-443.score: 15.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  39. Nancy M. Salbach & Susan B. Jaglal (2011). Creation and Validation of the Evidence‐Based Practice Confidence Scale for Health Care Professionals. Journal of Evaluation in Clinical Practice 17 (4):794-800.score: 15.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  40. Ilona Schwentner, Christian Schwentner, Joachim Schmutzhard, Christian Radmayr, Gudrun Grabher, Georg Sprinzl & Stefan Höfer (2007). Validation of the German Glasgow Children's Benefit Inventory. Journal of Evaluation in Clinical Practice 13 (6):942-946.score: 15.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  41. Frederick C. Copleston (1950). A Note on Verification. Mind 59 (236):522-529.score: 14.0
    The author, using bertrand russell's "human knowledge": "it's scope and limits", makes a point of departure where russell distinguishes between "meaning" and "significance." the author contends that in using these distinctions in a metaphysical argument, his purpose is not to show whether or not the argument is possible, but to show the problem of validity of metaphysical arguments as the remaining fundamental problem in regards to metaphysics. (staff).
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  42. Cora Diamond (1999). How Old Are These Bones? Putnam, Wittgenstein and Verification: Cora Diamond. Aristotelian Society Supplementary Volume 73 (1):99–134.score: 12.0
    Hilary Putnam has argued against philosophical theories which tie the content of truth-claims closely to the available methods of investigation and verification. Such theories, he argues, threaten our idea of human communication, which we take to be possible between people of different cultures and across periods of time during which methods of investigation change dramatically. Putnam rejects any reading of Wittgenstein which takes him to make a close tie between meaning and method of verification. What strands in Wittgenstein's (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  43. James H. Fetzer (1988). Program Verification: The Very Idea. Communications of the ACM 31 (9):1048--1063.score: 12.0
    The notion of program verification appears to trade upon an equivocation. Algorithms, as logical structures, are appropriate subjects for deductive verification. Programs, as causal models of those structures, are not. The success of program verification as a generally applicable and completely reliable method for guaranteeing program performance is not even a theoretical possibility.
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  44. Mark D. Semon (1982). Experimental Verification of an Aharonov-Bohm Effect in Rotating Reference Frames. Foundations of Physics 12 (1):49-57.score: 12.0
    A thought experiment is reviewed which shows two things. First, in a region of a rotating frame that is not simply connected, the inertial forces can be canceled without completely canceling the inertial vector potential (whose curl determines the Coriolis force); second, the presence of this uncanceled potential can be detected in a quantum interference experiment. It is then argued that the thought experiment was realized in an earlier experiment involving a rotating superconductor, and that the experimental results confirm the (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  45. Alexander Miller (1998). Emotivism and the Verification Principle. Proceedings of the Aristotelian Society 98 (2):103–124.score: 12.0
    In chapter VI of Language, Truth, and Logic, A.J. Ayer argues that ethical statements are not literally significant. Unlike metaphysical statements, however, ethical statements are not nonsensical: even though they are not literally significant, Ayer thinks that they possess some other sort of significance. This raises the question: by what principle or criterion can we distinguish, among the class of statements that are not literally significant, between those which are genuinely meaningless and those which possess some other, non-literal form of (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  46. John Turri & Peter Blouw (forthcoming). Excuse Validation: A Study in Rule-Breaking. Philosophical Studies:1-20.score: 12.0
    Can judging that an agent blamelessly broke a rule lead us to claim, paradoxically, that no rule was broken at all? Surprisingly, it can. Across seven experiments, we document and explain the phenomenon of excuse validation. We found when an agent blamelessly breaks a rule, it significantly distorts people’s description of the agent’s conduct. Roughly half of people deny that a rule was broken. The results suggest that people engage in excuse validation in order to avoid indirectly blaming (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  47. Andreas Blank (2011). Wittgenstein on Verification and Seeing-As, 1930–1932. Inquiry 54 (6):614 - 632.score: 12.0
    Abstract This article examines the little-explored remarks on verification in Wittgenstein's notebooks during the period between 1930 and 1932. In these remarks, Wittgenstein connects a verificationist theory of meaning with the notion of logical multiplicity, understood as a space of possibilities: a proposition is verified by a fact if and only if the proposition and the fact have the same logical multiplicity. But while in his early philosophy logical multiplicities were analysed as an outcome of the formal properties of (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  48. Peter Milne (1991). Verification, Falsification, and the Logic of Enquiry. Erkenntnis 34 (1):23 - 54.score: 12.0
    Our starting point is Michael Luntley's falsificationist semantics for the logical connectives and quantifiers: the details of his account are criticised but we provide an alternative falsificationist semantics that yields intuitionist logic, as Luntley surmises such a semantics ought. Next an account of the logical connectives and quantifiers that combines verificationist and falsificationist perspectives is proposed and evaluated. While the logic is again intuitionist there is, somewhat surprisingly, an unavoidable asymmetry between the verification and falsification conditions for negation, the (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  49. Selcuk R. Sirin, Mary M. Brabeck, Anmol Satiani & Lauren Rogers-Serin (2003). Validation of a Measure of Ethical Sensitivity and Examination of the Effects of Previous Multicultural and Ethics Courses on Ethical Sensitivity. Ethics and Behavior 13 (3):221 – 235.score: 12.0
    This article describes the development of a computerized version of a measure of ethical sensitivity to racial and gender intolerance, the Racial Ethical Sensitivity Test (REST; Brabeck et al., 2000). The REST was based on James Rest's (1983) 4-component model of moral development and the professional codes of ethics from school-based professions. The new version, Racial and Ethical Sensitivity Test-Compact Disk (REST-CD), consists of 5 videotaped scenarios (used in the original REST) followed by an interactive "interview" presented on compact discs. (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  50. Harvey Friedman, Adventures in the Verification of Mathematics.score: 12.0
    Mathematical statements arising from program verification are believed to be much easier to deal with than statements coming from serious mathematics. At least this is true for “normal programming”.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
1 — 50 / 1000