Search results for 'effective computing' (try it on Scholar)

1000+ found
Order:
  1. Vincent C. Müller (2011). On the Possibilities of Hypercomputing Supertasks. Minds and Machines 21 (1):83-96.
    This paper investigates the view that digital hypercomputing is a good reason for rejection or re-interpretation of the Church-Turing thesis. After suggestion that such re-interpretation is historically problematic and often involves attack on a straw man (the ‘maximality thesis’), it discusses proposals for digital hypercomputing with Zeno-machines , i.e. computing machines that compute an infinite number of computing steps in finite time, thus performing supertasks. It argues that effective computing with Zeno-machines falls into a dilemma: either (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  2.  14
    Boudewijn de Bruin & Luciano Floridi (forthcoming). The Ethics of Cloud Computing. Science and Engineering Ethics:1-19.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacentres. It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies. And it examines the business and private ‘clouders’ using these services. (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  3.  15
    James H. Fetzer (2000). Computing is at Best a Special Kind of Thinking. In The Proceedings of the Twentieth World Congress of Philosophy. Charlottesville: Philosophy Doc Ctr 103-113.
    When computing is defined as the causal implementation of algorithms and algorithms are defined as effective decision procedures, human thought is mental computation only if it is governed by mental algorithms. An examination of ordinary thinking, however, suggests that most human thought processes are non-algorithmic. Digital machines, moreover, are mark-manipulating or string-processing systems whose marks or strings do not stand for anything for those systems, while minds are semiotic (or “signusing”) systems for which signs stand for other things (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  4.  50
    Anthony F. Beavers (2011). Recent Developments in Computing and Philosophy. Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 42 (2):385-397.
    Because the label "computing and philosophy" can seem like an ad hoc attempt to tie computing to philosophy, it is important to explain why it is not, what it studies (or does) and how it differs from research in, say, "computing and history," or "computing and biology". The American Association for History and Computing is "dedicated to the reasonable and productive marriage of history and computer technology for teaching, researching and representing history through scholarship and (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  5.  11
    Eli Dresner (2012). Turing, Matthews and Millikan: Effective Memory, Dispositionalism and Pushmepullyou Mental States. International Journal of Philosophical Studies 20 (4):461-472.
    Abstract In the first section of the paper I present Alan Turing?s notion of effective memory, as it appears in his 1936 paper ?On Computable Numbers, With an Application to The Entscheidungsproblem?. This notion stands in surprising contrast with the way memory is usually thought of in the context of contemporary computer science. Turing?s view (in 1936) is that for a computing machine to remember a previously scanned string of symbols is not to store an internal symbolic image (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  6.  3
    Jane Coughlan & Stephen Swift (2011). Student and Tutor Perceptions of Learning and Teaching on a First‐Year Study Skills Module in a University Computing Department. Educational Studies 37 (5):529-539.
    The level of student preparedness for university?level study has been widely debated. Effective study skills modules have been linked to supporting students? academic development during the transition phase. However, few studies have evaluated the learning experience on study skills modules from both a student and staff perspective. We surveyed 121 first?year students and seven tutors on a study skills module on an undergraduate computing programme. The aspects in which the students? and tutors? views diverge provide insights into the (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  7. Oliver Boyd‐Barrett (1990). Schools’ Computing Policy as State‐Directed Innovation. Educational Studies 16 (2):169-185.
    The decade 1980‐90 was one of great importance for educational computing. The outstanding feature of the first half of the decade was the Micro‐electronics Education Programme which ran from 1981 to 1986. This period may be described as one of relatively open‐ended exploration. In the second half of the decade, by contrast, there was a sharpening of policy goals and a move towards curriculum compulsion. This paper seeks to establish the key role of central government in promoting the use (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  8.  8
    Timothy H. McNicholl (2013). Computing Links and Accessing Arcs. Mathematical Logic Quarterly 59 (1‐2):101-107.
    Sufficient conditions are given for the computation of an arc that accesses a point on the boundary of an open subset of the plane from a point within the set. The existence of a not-computably-accessible but computable point on a computably compact arc is also demonstrated.
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  9.  5
    Martin Kummer & Frank Stephan (1994). Effective Search Problems. Mathematical Logic Quarterly 40 (2):224-236.
    The task of computing a function F with the help of an oracle X can be viewed as a search problem where the cost measure is the number of queries to X. We ask for the minimal number that can be achieved by a suitable choice of X and call this quantity the query complexity of F. This concept is suggested by earlier work of Beigel, Gasarch, Gill, and Owings on “Bounded query classes”. We introduce a fault tolerant version (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  10.  24
    Jacques N. Catudal (1999). Censorship, the Internet, and the Child Pornography Law of 1996: A Critique. [REVIEW] Ethics and Information Technology 1 (2):105-115.
    After describing the Child Pornography Prevention Act (CPPA) of 1996, I argue that the Act ought to be significantly amended. The central objections to CPPA are (1) that it is so broad in its main proscriptions as to violate the First Amendment rights of adults; (2) that it altogether fails to provide minors and their legal guardians with the privacy rights needed to combat the harms associated with certain classes of prurient material on the Internet; and, (3) that the actual (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  11. Anthony Skelton (2016). The Ethical Principles of Effective Altruism. Journal of Global Ethics 12 (2).
    This paper is an examination of the ethical principles of effective altruism as they are articulated by Peter Singer in his book The Most Good You Can Do. It discusses the nature and the plausibility of the principles that he thinks both guide and ought to guide effective altruists. It argues in § II pace Singer that it is unclear that in charitable giving one ought always to aim to produce the most surplus benefit possible and in § (...)
    Translate
      Direct download  
     
    Export citation  
     
    My bibliography  
  12.  77
    Matteo Colombo (2016). Why Build a Virtual Brain? Large-Scale Neural Simulations as Jump Start for Cognitive Computing. Journal of Experimental and Theoretical Artificial Intelligence.
    Despite the impressive amount of financial resources recently invested in carrying out large-scale brain simulations, it is controversial what the pay-offs are of pursuing this project. One idea is that from designing, building, and running a large-scale neural simulation, scientists acquire knowledge about the computational performance of the simulating system, rather than about the neurobiological system represented in the simulation. It has been claimed that this knowledge may usher in a new era of neuromorphic, cognitive computing systems. This study (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  13.  78
    Vincent C. Müller (2008). What a Course on Philosophy of Computing is Not. APA Newsletter on Philosophy and Computers 8 (1):36-38.
    Immanuel Kant famously defined philosophy to be about three questions: “What can I know? What should I do? What can I hope for?” (KrV, B833). I want to suggest that the three questions of our course on the philosophy of computing are: What is computing? What should we do with computing? What could computing do?
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  14.  22
    Viola Schiaffonati & Mario Verdicchio (2014). Computing and Experiments. Philosophy and Technology 27 (3):359-376.
    The question about the scientific nature of computing has been widely debated with no universal consensus reached about its disciplinary status. Positions vary from acknowledging computing as the science of computers to defining it as a synthetic engineering discipline. In this paper, we aim at discussing the nature of computing from a methodological perspective. We consider, in particular, the nature and role of experiments in this field, whether they can be considered close to the traditional experimental scientific (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  15.  53
    Liesbeth De Mol & Giuseppe Primiero (2014). Facing Computing as Technique: Towards a History and Philosophy of Computing. Philosophy and Technology 27 (3):321-326.
    We present the methodological principles underlying the scientific activities of the DHST Commission on the History and Philosophy of Computing. This volume collects refereed selected papers from the First International Conference organized by the Commission.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  16.  76
    Jonathan Bain (2013). Emergence in Effective Field Theories. European Journal for Philosophy of Science 3 (3):257-273.
    This essay considers the extent to which a concept of emergence can be associated with Effective Field Theories (EFTs). I suggest that such a concept can be characterized by microphysicalism and novelty underwritten by the elimination of degrees of freedom from a high-energy theory, and argue that this makes emergence in EFTs distinct from other concepts of emergence in physics that have appeared in the recent philosophical literature.
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  17.  10
    Vasco Brattka (2005). Effective Borel Measurability and Reducibility of Functions. Mathematical Logic Quarterly 51 (1):19-44.
    The investigation of computational properties of discontinuous functions is an important concern in computable analysis. One method to deal with this subject is to consider effective variants of Borel measurable functions. We introduce such a notion of Borel computability for single-valued as well as for multi-valued functions by a direct effectivization of the classical definition. On Baire space the finite levels of the resulting hierarchy of functions can be characterized using a notion of reducibility for functions and corresponding complete (...)
    Direct download (7 more)  
     
    Export citation  
     
    My bibliography   12 citations  
  18.  41
    Matti Tedre (2011). Computing as a Science: A Survey of Competing Viewpoints. [REVIEW] Minds and Machines 21 (3):361-387.
    Since the birth of computing as an academic discipline, the disciplinary identity of computing has been debated fiercely. The most heated question has concerned the scientific status of computing. Some consider computing to be a natural science and some consider it to be an experimental science. Others argue that computing is bad science, whereas some say that computing is not a science at all. This survey article presents viewpoints for and against computing as (...)
    Direct download (15 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  19.  6
    Viola Schiaffonati (2016). Stretching the Traditional Notion of Experiment in Computing: Explorative Experiments. Science and Engineering Ethics 22 (3):647-665.
    Experimentation represents today a ‘hot’ topic in computing. If experiments made with the support of computers, such as computer simulations, have received increasing attention from philosophers of science and technology, questions such as “what does it mean to do experiments in computer science and engineering and what are their benefits?” emerged only recently as central in the debate over the disciplinary status of the discipline. In this work we aim at showing, also by means of paradigmatic examples, how the (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  20.  78
    Aaron Sloman (1992). Prolegomena to a Theory of Communication and Affect. In Andrew Ortony, Jon Slack & Oliviero Stock (eds.), Communication from an Artificial Intelligence Perspective: Theoretical and Applied Issues. Springer
    As a step towards comprehensive computer models of communication, and effective human machine dialogue, some of the relationships between communication and affect are explored. An outline theory is presented of the architecture that makes various kinds of affective states possible, or even inevitable, in intelligent agents, along with some of the implications of this theory for various communicative processes. The model implies that human beings typically have many different, hierarchically organized, dispositions capable of interacting with new information to produce (...)
    Translate
      Direct download  
     
    Export citation  
     
    My bibliography  
  21.  67
    Walter Maner (1996). Unique Ethical Problems in Information Technology. Science and Engineering Ethics 2 (2):137-154.
    A distinction is made between moral indoctrination and instruction in ethics. It is argued that the legitimate and important field of computer ethics should not be permitted to become mere moral indoctrination. Computer ethics is an academic field in its own right with unique ethical issues that would not have existed if computer technology had not been invented. Several example issues are presented to illustrate this point. The failure to find satisfactory non-computer analogies testifies to the uniqueness of computer ethics. (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   10 citations  
  22.  41
    Rodney Van Meter (2014). Quantum Computing's Classical Problem, Classical Computing's Quantum Problem. Foundations of Physics 44 (8):819-828.
    Tasked with the challenge to build better and better computers, quantum computing and classical computing face the same conundrum: the success of classical computing systems. Small quantum computing systems have been demonstrated, and intermediate-scale systems are on the horizon, capable of calculating numeric results or simulating physical systems far beyond what humans can do by hand. However, to be commercially viable, they must surpass what our wildly successful, highly advanced classical computers can already do. At the (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  23.  6
    Eric Hatleback & Jonathan M. Spring (2014). Exploring a Mechanistic Approach to Experimentation in Computing. Philosophy and Technology 27 (3):441-459.
    The mechanistic approach in philosophy of science contributes to our understanding of experimental design. Applying the mechanistic approach to experimentation in computing is beneficial for two reasons. It connects the methodology of experimentation in computing with the methodology of experimentation in established sciences, thereby strengthening the scientific reputability of computing and the quality of experimental design therein. Furthermore, it pinpoints the idiosyncrasies of experimentation in computing: computing deals closely with both natural and engineered mechanisms. Better (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  24.  36
    Surendra Arjoon (2006). Striking a Balance Between Rules and Principles-Based Approaches for Effective Governance: A Risks-Based Approach. [REVIEW] Journal of Business Ethics 68 (1):53 - 82.
    Several recent studies and initiatives have emphasized the importance of a strong ethical organizational DNA (ODNA) to create and promote an effective corporate governance culture of trust, integrity and intellectual honesty. This paper highlights the drawbacks of an excessively heavy reliance on rules-based approaches that increase the cost of doing business, overshadow essential elements of good corporate governance, create a culture of dependency, and can result in legal absolutism. The paper makes the case that the way forward for (...) corporate governance is to strike an optimal balance between rules-based and principles-based approaches. The recent corporate scandals have demonstrated that the ethical ODNA is critical to the driving force and basis of legal and regulatory requirements. Effective governance means adhering to ethical principles, not merely complying with rules, and is a crucial guardian of a firm’s reputation and integrity. It is through an effective corporate governance program (that is, one that optimally captures and integrates the appropriate aspects of rules-based and principles-based approaches, and identifies and assesses the related risks) that an organization can reconfigure its ODNA for improved performance. Focusing on the ethical ODNA as the basis of new governance measures provides an opportunity to develop a competitive advantage as it represents a potential source of differentiation, strengthens the relationship with all stakeholders of the organization by building a culture of trust and integrity, and re-instills investor confidence. This paper employs dialectical reasoning that links the ODNA through principles-driven rules in developing a risks-based approach. A comparison from a risk assessment perspective between rules-based and principles-based approaches is presented. Although there have been few applications employing dialectical reasoning in business research, this methodology can be extremely useful in isolating ethical issues and integrating them into the business process. The risks-based approach captures the benefits of both rules-based and principles-based approaches, and incorporates trust-based principles such␣as solidarity, subsidiarity and covenantal relationships. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  25.  50
    Carol E. Cleland (2002). On Effective Procedures. Minds and Machines 12 (2):159-179.
    Since the mid-twentieth century, the concept of the Turing machine has dominated thought about effective procedures. This paper presents an alternative to Turing's analysis; it unifies, refines, and extends my earlier work on this topic. I show that Turing machines cannot live up to their billing as paragons of effective procedure; at best, they may be said to provide us with mere procedure schemas. I argue that the concept of an effective procedure crucially depends upon distinguishing procedures (...)
    Direct download (17 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  26.  56
    Oron Shagrir (2002). Effective Computation by Humans and Machines. Minds and Machines 12 (2):221-240.
    There is an intensive discussion nowadays about the meaning of effective computability, with implications to the status and provability of the Church–Turing Thesis (CTT). I begin by reviewing what has become the dominant account of the way Turing and Church viewed, in 1936, effective computability. According to this account, to which I refer as the Gandy–Sieg account, Turing and Church aimed to characterize the functions that can be computed by a human computer. In addition, Turing provided a highly (...)
    Direct download (18 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  27.  20
    Soraj Hongladarom (2013). Ubiquitous Computing, Empathy and the Self. AI and Society 28 (2):227-236.
    The paper discusses ubiquitous computing and the conception of the self, especially the question how the self should be understood in the environment pervaded by ubiquitous computing, and how ubiquitous computing makes possible direct empathy where each person or self connected through the network has direct access to others’ thoughts and feelings. Starting from a conception of self, which is essentially distributed, composite and constituted through information, the paper argues that when a number of selves are connected (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  28.  5
    Jonathan Stephenson (2016). Controlling Effective Packing Dimension of $Delta^{0}_{2}$ Degrees. Notre Dame Journal of Formal Logic 57 (1):73-93.
    This paper presents a refinement of a result by Conidis, who proved that there is a real $X$ of effective packing dimension $0\lt \alpha\lt 1$ which cannot compute any real of effective packing dimension $1$. The original construction was carried out below $\emptyset''$, and this paper’s result is an improvement in the effectiveness of the argument, constructing such an $X$ by a limit-computable approximation to get $X\leq_{T}\emptyset'$.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  29.  32
    Bernard Gert (1999). Common Morality and Computing. Ethics and Information Technology 1 (1):53-60.
    This article shows how common morality can be helpful in clarifying the discussion of ethical issues that arise in computing. Since common morality does not always provide unique answers to moral questions, not all such issues can be resolved, however common morality does provide a clear answer to the question whether one can illegally copy software for a friend.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  30.  22
    Wilfried Sieg, Church Without Dogma: Axioms for Computability.
    Church's and Turing's theses dogmatically assert that an informal notion of effective calculability is adequately captured by a particular mathematical concept of computability. I present an analysis of calculability that is embedded in a rich historical and philosophical context, leads to precise concepts, but dispenses with theses. To investigate effective calculability is to analyze symbolic processes that can in principle be carried out by calculators. This is a philosophical lesson we owe to Turing. Drawing on that lesson and (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  31.  12
    Bernardo Aguilera (2015). Behavioural Explanation in the Realm of Non-Mental Computing Agents. Minds and Machines 25 (1):37-56.
    Recently, many philosophers have been inclined to ascribe mentality to animals on the main grounds that they possess certain complex computational abilities. In this paper I contend that this view is misleading, since it wrongly assumes that those computational abilities demand a psychological explanation. On the contrary, they can be just characterised from a computational level of explanation, which picks up a domain of computation and information processing that is common to many computing systems but is autonomous from the (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  32.  8
    Robert Rosenberger (2013). The Importance of Generalized Bodily Habits for a Future World of Ubiquitous Computing. AI and Society 28 (3):289-296.
    In a future world of ubiquitous computing, in which humans interact with computerized technologies even more frequently and in even more situations than today, interface design will have increased importance. One feature of interface that I argue will be especially relevant is what I call abstract relational strategies. This refers to an approach (in both a bodily and conceptual sense) toward the use of a technology, an approach that is general enough to be applied in many different concrete scenarios. (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  33.  30
    Edward J. O'Boyle (2002). An Ethical Decision-Making Process for Computing Professionals. Ethics and Information Technology 4 (4):267-277.
    Our comments focus on the ACMCode of Ethics and situate the Code within ageneral ethical decision-making process tospecify the five steps which logically precedehuman action in ethical matters and determinethat action, and the individual differencetraits in these five steps which bear upon theresolution of an ethical problem and lead tomorally responsible action. Our main purpose isto present a cognitive moral processing modelwhich computing professionals can use to betterunderstand their professional rights andduties. It is clear that the Code providessubstantial guidance (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  34.  17
    Uri Pincas (2011). Program Verification and Functioning of Operative Computing Revisited: How About Mathematics Engineering? [REVIEW] Minds and Machines 21 (2):337-359.
    The issue of proper functioning of operative computing and the utility of program verification, both in general and of specific methods, has been discussed a lot. In many of those discussions, attempts have been made to take mathematics as a model of knowledge and certitude achieving, and accordingly infer about the suitable ways to handle computing. I shortly review three approaches to the subject, and then take a stance by considering social factors which affect the epistemic status of (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  35.  11
    Abbas Edalat (1997). Domains for Computation in Mathematics, Physics and Exact Real Arithmetic. Bulletin of Symbolic Logic 3 (4):401-452.
    We present a survey of the recent applications of continuous domains for providing simple computational models for classical spaces in mathematics including the real line, countably based locally compact spaces, complete separable metric spaces, separable Banach spaces and spaces of probability distributions. It is shown how these models have a logical and effective presentation and how they are used to give a computational framework in several areas in mathematics and physics. These include fractal geometry, where new results on existence (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  36.  26
    Lukáš Sekanina (2007). Evolved Computing Devices and the Implementation Problem. Minds and Machines 17 (3):311-329.
    The evolutionary circuit design is an approach allowing engineers to realize computational devices. The evolved computational devices represent a distinctive class of devices that exhibits a specific combination of properties, not visible and studied in the scope of all computational devices up till now. Devices that belong to this class show the required behavior; however, in general, we do not understand how and why they perform the required computation. The reason is that the evolution can utilize, in addition to the (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  37.  32
    Jeremy Seligman (2002). The Scope of Turing's Analysis of Effective Procedures. Minds and Machines 12 (2):203-220.
    Turing's (1936) analysis of effective symbolic procedures is a model of conceptual clarity that plays an essential role in the philosophy of mathematics. Yet appeal is often made to the effectiveness of human procedures in other areas of philosophy. This paper addresses the question of whether Turing's analysis can be applied to a broader class of effective human procedures. We use Sieg's (1994) presentation of Turing's Thesis to argue against Cleland's (1995) objections to Turing machines and we evaluate (...)
    Direct download (16 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  38.  7
    Professor Walter Maner (1996). Unique Ethical Problems in Information Technology. Science and Engineering Ethics 2 (2):137-154.
    A distinction is made between moral indoctrination and instruction in ethics. It is argued that the legitimate and important field of computer ethics should not be permitted to become mere moral indoctrination. Computer ethics is an academic field in its own right with unique ethical issues that would not have existed if computer technology had not been invented. Several example issues are presented to illustrate this point. The failure to find satisfactory non-computer analogies testifies to the uniqueness of computer ethics. (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  39.  5
    Rod Downey & Keng Meng Ng (2010). Effective Packing Dimension and Traceability. Notre Dame Journal of Formal Logic 51 (2):279-290.
    We study the Turing degrees which contain a real of effective packing dimension one. Downey and Greenberg showed that a c.e. degree has effective packing dimension one if and only if it is not c.e. traceable. In this paper, we show that this characterization fails in general. We construct a real $A\leq_T\emptyset''$ which is hyperimmune-free and not c.e. traceable such that every real $\alpha\leq_T A$ has effective packing dimension 0. We construct a real $B\leq_T\emptyset'$ which is not (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  40.  8
    Jens Blanck, Viggo Stoltenberg‐Hansen & John V. Tucker (2011). Stability of Representations of Effective Partial Algebras. Mathematical Logic Quarterly 57 (2):217-231.
    An algebra is effective if its operations are computable under some numbering. When are two numberings of an effective partial algebra equivalent? For example, the computable real numbers form an effective field and two effective numberings of the field of computable reals are equivalent if the limit operator is assumed to be computable in the numberings . To answer the question for effective algebras in general, we give a general method based on an algebraic analysis (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  41.  3
    Geoffrey K. Pullum (1987). Natural Language Interfaces and Strategic Computing. AI and Society 1 (1):47-58.
    Modern weaponry is often too complex for unaided human operation, and is largely or totally controlled by computers. But modern software, particularly artificial intelligence software, exhibits such complexity and inscrutability that there are grave dangers associated with its use in non-benign applications. Recent efforts to make computer systems more accessible to military personnel through natural language processing systems, as proposed in the Strategic Computing Initiative of the Defense Advanced Research Projects Agency, increases rather than decreases the dangers of unpredictable (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  42.  23
    Merle Spriggs (2008). The Ethics of Research on Less Expensive, Less Effective Interventions: A Case for Analysis. [REVIEW] Journal of Bioethical Inquiry 5 (4):295-302.
    The Kennedy Krieger lead paint study is a landmark case in human experimentation and a classic case in research ethics. In this paper I use the lead paint study to assist in the analysis of the ethics of research on less expensive, less effective interventions. I critically evaluate an argument by Buchanan and Miller who defend both the Kennedy Krieger lead paint study and public health research on less expensive, less effective interventions. I conclude that Buchanan and Miller’s (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  43.  6
    Chris Hables Gray (1988). The Strategic Computing Program at Four Years: Implications and Intimations. [REVIEW] AI and Society 2 (2):141-149.
    Examining the Strategic Computing Program after four years, in the context of the crucial recognition that it is only a small part of the whole range of military artificial intelligence applications, suggests a number of clear implications and intimations about such crucial questions as: 1) the current roles of industry and the universities in developing high technology war; 2) the effects on political and military policy of high-tech weapons systems; and 3) the importance of advanced military computing to (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  44.  17
    Shyam B. Bhandari (1997). Some Ethical Issues in Computation and Disclosure of Interest Rate and Cost of Credit. Journal of Business Ethics 16 (5):531-535.
    Although the mathematics of interest is very precise, the practice of charging computing and disclosing interest or cost of credit is full of variations and therefore often questionable on ethical grounds. The purpose of this paper is to examine some of the prevalent practices which are incorrect, illogical, unfair or deceptive. Both utilitarian and formalist schools of ethical theory would find these practices to be inappropriate. The paper will specifically look at unfair practices in the areas of estimation of (...)
    Direct download (7 more)  
     
    Export citation  
     
    My bibliography  
  45.  10
    Chris J. Conidis (2012). A Real of Strictly Positive Effective Packing Dimension That Does Not Compute a Real of Effective Packing Dimension One. Journal of Symbolic Logic 77 (2):447-474.
    Recently, the Dimension Problem for effective Hausdorff dimension was solved by J. Miller in [14], where the author constructs a Turing degree of non-integral Hausdorff dimension. In this article we settle the Dimension Problem for effective packing dimension by constructing a real of strictly positive effective packing dimension that does not compute a real of effective packing dimension one (on the other hand, it is known via [10, 3, 7] that every real of strictly positive (...) Hausdorff dimension computes reals whose effective packing dimensions are arbitrarily close to, but not necessarily equal to, one). (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  46.  1
    Y. Tsujii, T. Mori & M. Yasugi (2002). Metrization of the Uniform Space and Effective Convergence. Mathematical Logic Quarterly 48 (S1):123-130.
    The subject of the present article is the following fact. Consider an effective uniform space. A generally constructed metric from the uniformity has the property that a sequence from the space effectively converges with respect to the uniform topology if and only if it does with respect to the induced metric. This can be shown without assuming the computability of the metric.
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  47.  5
    Joanna Berzowska (2006). Personal Technologies: Memory and Intimacy Through Physical Computing. [REVIEW] AI and Society 20 (4):446-461.
    In this paper, I present an overview of personal and intimate technologies within a pedagogical context. I describe two courses that I have developed for Computation Arts at Concordia University: “Tangible Media and Physical Computing” and “Second Skin and Soft Wear.” Each course deals with different aspects of physical computing and tangible media in a Fine Arts context. In both courses, I introduce concepts of soft computation and intimate reactive artifacts as artworks. I emphasize the concept of memory (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  48.  10
    Chaudhary Imran Sarwar (2013). Future of Ethically Effective Leadership. Journal of Business Ethics 113 (1):81-89.
    This research focuses on (a) introducing and exploring ethically effective leadership, (b) introducing and testing theory on triad of typical–maximal–ideal ethically effective leadership performances, (b) theorizing and empirically testing that each of typical–maximal–ideal ethically effective leadership performance is different from each others, in other words exploring mean differences between each pair of typical–maximal–ideal effective leadership performances, (c) introducing, theorizing, and testing mechanism to quantify respondents’ intrinsic desire and inherent potential to enhance their ethically effective leadership (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  49.  4
    Joan Truckenbrod (1993). Women and the Social Construction of the Computing Culture: Evolving New Forms of Computing. [REVIEW] AI and Society 7 (4):345-357.
    Women have been excluded from the mainstream development of computer hardware and software. Consequently there is an imbalance in the masculine and feminine characteristics, functioning and applications of computing. A masculine approach is encoded into the technical personality of computing, and in the skills and knowledge necessary to utilise computers. The feminine perspective broadens the scope and objectives of computing. This paper examines the current computing culture, and proposes new models for computing that embrace the (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  50.  5
    Thomas Fuß (2002). SU(3) Local Gauge Field Theory as Effective Dynamics of Composite Gluons. Foundations of Physics 32 (11):1737-1755.
    The effective dynamics of quarks is described by a nonperturbatively regularized NJL model equation with canonical quantization and probability interpretation. The quantum theory of this model is formulated in functional space and the gluons are considered as relativistic bound states of colored quark-antiquark pairs. Their wave functions are calculated as eigenstates of hardcore equations, and their effective dynamics is derived by weak mapping in functional space. This leads to the phenomenological SU(3) gauge invariant gluon equations in functional formulation, (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
1 — 50 / 1000