Results for ' Computer files'

1000+ found
Order:
  1. Grid Computing, High Performance and Distributed Applications (GADA) 2006 International Conference-Grid File Transfer-Grid File Transfer During Deployment, Execution, and Retrieval.Francoise Caromel Baude & Mario Quilici Leyton - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 1191-1202.
    No categories
     
    Export citation  
     
    Bookmark  
  2.  28
    Files: Law and Media Technology.Cornelia Vismann - 2008 - Stanford University Press.
    The reign of paper files would seem to be over once files are reduced to the status of icons on computer screens, but Vismann's book, which examines the impact of the file on Western institutions throughout history, shows how the creation of order in medieval and early modern administrations makes its returns in computer architecture.
    Direct download  
     
    Export citation  
     
    Bookmark   13 citations  
  3. Files and Singular Thoughts Without Objects or Acquaintance: The Prospects of Recanati’s “Actualism”.Carsten Hansen & Georges Rey - 2016 - Review of Philosophy and Psychology 7 (2):421-436.
    We argue that Recanati burdens his otherwise salutary “Mental File” account of singular thought with an “Actualist” assumption that he has inherited from the discussion of singular thought since at least Evans, according to which singular thoughts can only be about actual objects: apparent singular thoughts involving “empty” terms lack truth-valuable content. This assumption flies in the face of manifestly singular thoughts involving not only fictional and mistakenly postulated entities, such as Zeus and the planet Vulcan, but also “perceptual inexistents,” (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4. The relationship between object Files and conscious perception.Stephen R. Mitroff, Brian J. Scholl & Karen Wynn - 2005 - Cognition 96 (1):67-92.
    Object files (OFs) are hypothesized mid-level representations which mediate our conscious perception of persisting objects—e.g. telling us ‘which went where’. Despite the appeal of the OF framework, not previous research has directly explored whether OFs do indeed correspond to conscious percepts. Here we present at least one case wherein conscious percepts of ‘which went where’ in dynamic ambiguous displays diverge from the analogous correspondence computed by the OF system. Observers viewed a ‘bouncing/streaming’ display in which two identical objects moved (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  5.  8
    Files: Law and Media Technology.Geoffrey Winthrop-Young (ed.) - 2008 - Stanford University Press.
    _Quod non est in actis, non est in mundo_. Once files are reduced to the status of stylized icons on computer screens, the reign of paper files appears to be over. With the epoch of files coming to an end, we are free to examine its fundamental influence on Western institutions. From a media-theoretical point of view, subject, state, and law reveal themselves to be effects of specific record-keeping and filing practices. Files are not simply (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. What Is an Object File?E. J. Green & Jake Quilty-Dunn - 2021 - British Journal for the Philosophy of Science 72 (3):665-699.
    The notion of an object file figures prominently in recent work in philosophy and cognitive science. Object files play a role in theories of singular reference, object individuation, perceptual memory, and the development of cognitive capacities. However, the philosophical literature lacks a detailed, empirically informed theory of object files. In this paper, we articulate and defend the multiple-slots view, which specifies both the format and architecture of object files. We argue that object files represent in a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   52 citations  
  7.  20
    Contract cheating by STEM students through a file sharing website: a Covid-19 pandemic perspective.Codrin Cotarlan & Thomas Lancaster - 2021 - International Journal for Educational Integrity 17 (1).
    Students are using file sharing sites to breach academic integrity in light of the Covid-19 pandemic. This paper analyses the use of one such site, Chegg, which offers “homework help” and other academic services to students. Chegg is often presented as a file sharing site in the academic literature, but that is just one of many ways in which it can be used. As this paper demonstrates, Chegg can and is used for contract cheating This is despite the apparent existence (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   12 citations  
  8.  47
    Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  18
    Computational History of Philosophy of Science Dataset.Daniel J. Hicks, Rick Morris & Evelyn Brister - unknown
    The Computational History of Philosophy of Science Dataset aims to be a comprehensive set of article and book chapter metadata for philosophy of science. The dataset covers the full run of over 40 journals and 3 major book series in the field. An automated author disambiguation script is used to construct canonical names for each author, and a combination of gender attribution methods is used to attribute the gender of each author. The full code used to generate the dataset is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  17
    Complexity Computer Simulation in the Study of the Overall Playing Method of Campus Football.Zhao Dai - 2021 - Complexity 2021:1-9.
    With the mutual exchange and integration of world football, modern football is in an increasingly comprehensive direction. This research mainly discusses complexity computer simulation in the study of the overall play of campus football. Complexity computer simulation is used to design the background of the simulated football field, and the area is divided according to the size ratio of the actual football field. Then, it uses drawing software to draw the football and player controls. The construction of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  53
    Ethical Decisions About Sharing Music Files in the P2P Environment.Rong-An Shang, Yu-Chen Chen & Pin-Cheng Chen - 2008 - Journal of Business Ethics 80 (2):349-365.
    Digitized information and network have made an enormous impact on the music and movie industries. Internet piracy is popular and has greatly threatened the companies in these industries. This study tests Hunt-Vitell’s ethical decision model and attempts to understand why and how people share unauthorized music files with others in the peer-to-peer (P2P) network. The norm of anti-piracy, the ideology of free software, the norm of reciprocity, and the ideology of consumer rights are proposed as four deontological norms related (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  12.  40
    Two Issues in Computer Ethics for Non-Programmers.Mark E. Wunderlich - 2010 - International Journal of Applied Philosophy 24 (2):255-264.
    Two of the distinctive ethical issues that arise for computer users (as opposed to computer programmers) have to do with the file formats that are used to encode information and the licensing terms for computer software. With respect to both issues, most professional philosophers do not recognize the burdens that they impose on others. Once one recognizes these burdens, a very simple argument demands changes in the behavior of the typical computer user: some of the ways (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13.  28
    De Se Attitudes and Computation.Neil Hamilton Fairley - 2020 - Theoria 87 (1):207-229.
    There has been debate between those who maintain that indexical expressions are not essential and those who maintain that such indexicals cannot be dispensed with without an important loss of content. This version of the essentialist view holds that thoughts must also have indexical elements. Indexical thoughts appear to be in tension with the computational theory of mind. In this case we have the following inconsistent triad: De se thoughts are essential. De se thoughts are indexical, they have a character. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  14.  9
    A Computational Model of Human Colour Vision for Film Restoration.Alessandro Rizzi, Luca Armellin, Beatrice Sarti & Alice Plutino - 2022 - Gestalt Theory 44 (1-2):175-182.
    Even today, film restoration is a challenge, because it involves multidisciplinary competences: from analogue film inspection and conservation to digitisation and image enhancement. In this context, thanks to the high manageability of digital files, the film restoration workflow often follows a digitisation step, which presents many approximations and issues that are often ignored. In this work, we propose an alternative approach to the issues commonly encountered in film restoration aiming at restoring the original colour appearance, through models of human (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  6
    Improving the Precision of Ability Estimates Using Time-On-Task Variables: Insights From the PISA 2012 Computer-Based Assessment of Mathematics.Denise Reis Costa, Maria Bolsinova, Jesper Tijmstra & Björn Andersson - 2021 - Frontiers in Psychology 12.
    Log-file data from computer-based assessments can provide useful collateral information for estimating student abilities. In turn, this can improve traditional approaches that only consider response accuracy. Based on the amounts of time students spent on 10 mathematics items from the PISA 2012, this study evaluated the overall changes in and measurement precision of ability estimates and explored country-level heterogeneity when combining item responses and time-on-task measurements using a joint framework. Our findings suggest a notable increase in precision with the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  3
    Two Issues in Computer Ethics for Non-Programmers.Mark E. Wunderlich - 2010 - International Journal of Applied Philosophy 24 (2):255-264.
    Two of the distinctive ethical issues that arise for computer users (as opposed to computer programmers) have to do with the file formats that are used to encode information and the licensing terms for computer software. With respect to both issues, most professional philosophers do not recognize the burdens that they impose on others. Once one recognizes these burdens, a very simple argument demands changes in the behavior of the typical computer user: some of the ways (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  7
    Learning Consistent, Interactive, and Meaningful Task‐Action Mappings: A Computational Model.Andrew Howes & Richard M. Young - 1996 - Cognitive Science 20 (3):301-356.
    Within the field of human‐computer interaction, the study of the interaction between people and computers has revealed many phenomena. For example, highly interactive devices, such as the Apple Macintosh, are often easier to learn and use than keyboard‐based devices such as Unix. Similarly, consistent interfaces are easier to learn and use than inconsistent ones. This article describes an integrated cognitive model designed to exhibit a range of these phenomena while learning task‐action mappings: action sequences for achieving simple goals, such (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  6
    Real-Time Animation Complexity of Interactive Clothing Design Based on Computer Simulation.Yufeng Xin, Dongliang Zhang & Guopeng Qiu - 2021 - Complexity 2021:1-11.
    With the innovation of computer, virtual clothing has also emerged. This research mainly discusses the real-time animation complex of interactive clothing design based on computer simulation. In the process of realizing virtual clothing, the sample interpolation synthesis method is used, and the human body sample library is constructed using the above two methods first, and then, the human body model is obtained by interpolation calculation according to the personalized parameters. Building a clothing model is particularly important for the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  11
    Are Individuals More Willing to Lie to a Computer or a Human? Evidence from a Tax Compliance Setting.Ethan LaMothe & Donna Bobek - 2020 - Journal of Business Ethics 167 (2):157-180.
    Individuals are increasingly switching from hiring tax professionals to prepare their tax returns to self-filing with tax software, yet there is little research about how interacting with tax software influences compliance decisions. Using an experiment, we examine the effect of preparation method, tax software versus tax professional, on willingness to lie. Results from a structural equation model based on data collected from 211 actual taxpayers confirm the hypotheses and show individuals are more willing to lie to tax software than a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  28
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  14
    Learning Consistent, Interactive, and Meaningful Task‐Action Mappings: A Computational Model.Andrew Howes & Richard M. Young - 1996 - Cognitive Science 20 (3):301-356.
    Within the field of human‐computer interaction, the study of the interaction between people and computers has revealed many phenomena. For example, highly interactive devices, such as the Apple Macintosh, are often easier to learn and use than keyboard‐based devices such as Unix. Similarly, consistent interfaces are easier to learn and use than inconsistent ones. This article describes an integrated cognitive model designed to exhibit a range of these phenomena while learning task‐action mappings: action sequences for achieving simple goals, such (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  6
    Design and Implementation of Decentralized Swarm Intelligence E-Commerce Model Based on Regional Chain and Edge Computing.Xiaofang Luo - 2021 - Complexity 2021:1-11.
    In this paper, we investigate the model of decentralized groupwise e-commerce through regional chains combined with edge computing algorithms and design and implement it. A blockchain-based architecture for remote sensing resource and service transactions is proposed. The architecture utilizes the characteristics of nontamperable and traceable data on the blockchain to solve the problem of mutual distrust between the transaction parties, uses MongoDB for data retrieval and filtering to solve the problem that it is difficult to query flexibly on the blockchain, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  7
    Research on parallel data processing of data mining platform in the background of cloud computing.Lijun Wu, Haiyan Xing, Hui Zhang & Lingrui Bu - 2021 - Journal of Intelligent Systems 30 (1):479-486.
    The efficient processing of large-scale data has very important practical value. In this study, a data mining platform based on Hadoop distributed file system was designed, and then K-means algorithm was improved with the idea of max-min distance. On Hadoop distributed file system platform, the parallelization was realized by MapReduce. Finally, the data processing effect of the algorithm was analyzed with Iris data set. The results showed that the parallel algorithm divided more correct samples than the traditional algorithm; in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  27
    The Authority of Reason.Stephen Darwall - 2000 - Philosophical Review 109 (4):583.
    At the time of her death in 1996, Jean Hampton was working on a book on practical reason she had tentatively titled, A Theory of Reasons. The above volume consists of the materials she left, together with useful editorial clues to the state of their relative completeness. Computer file dates make it clear that Hampton was engaged in a significant revision of the text and had gotten as far as Chapter 3 of a nine-chapter book. Revisions of two-thirds of (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   61 citations  
  25. What am I? Virtual machines and the mind/body problem.John L. Pollock - 2008 - Philosophy and Phenomenological Research 76 (2):237–309.
    When your word processor or email program is running on your computer, this creates a "virtual machine” that manipulates windows, files, text, etc. What is this virtual machine, and what are the virtual objects it manipulates? Many standard arguments in the philosophy of mind have exact analogues for virtual machines and virtual objects, but we do not want to draw the wild metaphysical conclusions that have sometimes tempted philosophers in the philosophy of mind. A computer file is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26.  18
    What Am I? Virtual Machines and the Mind/body Problem.John L. Pollock - 2008 - Philosophy and Phenomenological Research 76 (2):237-309.
    When your word processor or email program is running on your computer, this creates a “virtual machine” that manipulates windows, files, text, etc. What is this virtual machine, and what are the virtual objects it manipulates? Many standard arguments in the philosophy of mind have exact analogues for virtual machines and virtual objects, but we do not want to draw the wild metaphysical conclusions that have sometimes tempted philosophers in the philosophy of mind. A computer file is (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  27.  35
    Spanish public awareness regarding DNA profile databases in forensic genetics: what type of DNA profiles should be included?J. J. Gamero, J. -L. Romero, J. -L. Peralta, M. Carvalho & F. Corte-Real - 2007 - Journal of Medical Ethics 33 (10):598-604.
    The importance of non-codifying DNA polymorphism for the administration of justice is now well known. In Spain, however, this type of test has given rise to questions in recent years: Should consent be obtained before biological samples are taken from an individual for DNA analysis? Does society perceive these techniques and methods of analysis as being reliable? There appears to be lack of knowledge concerning the basic norms that regulate databases containing private or personal information and the protection that information (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  18
    Medieval spelling in the dialogus edition.John Kilcullen - unknown
    I have been surveying the spelling across a range of the manuscripts; my findings are given under “Profiles” at the end. The method I have used is to find the word by electronic search in my computer files, then find corresponding places in the MSS. If abbreviation conceals the spelling I search further. This method does not guarantee that the spelling I find at some place in a MS is used throughout the MS; indeed in some cases I (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  38
    The authority of reason.Stephen Darwall - 2000 - Philosophical Review 109 (4):583-586.
    At the time of her death in 1996, Jean Hampton was working on a book on practical reason she had tentatively titled, A Theory of Reasons. The above volume consists of the materials she left, together with useful editorial clues to the state of their relative completeness. Computer file dates make it clear that Hampton was engaged in a significant revision of the text and had gotten as far as Chapter 3 of a nine-chapter book. Revisions of two-thirds of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  30. What Turing Himself Said About the Imitation Game.Diane Proudfoot - 2015 - IEEE Spectrum 52 (7):42-47.
    The imitation game, the recent biopic about Alan Turing's efforts to decipher Nazi naval codes, was showered with award nominations. It even won the 2015 Academy Award for Best Adapted Screenplay. One thing it won't win any awards for, though, is its portrayal of the "imitation game" itself-Turing's proposed test of machine thinking, which hinges on whether a computer can convincingly imitate a person. The Turing test, as it is now called, doesn't really feature in the file. (Given that (...)
    No categories
     
    Export citation  
     
    Bookmark  
  31.  21
    Towards a conversational culture? How participants establish strategies for co-ordinating chat postings in the context of in-service training.Åsa Mäkitalo & Mona Nilsen - 2010 - Discourse Studies 12 (1):90-105.
    Within the research field of computer-mediated communication, extensive attention has been paid to the differences between CMC and spoken conversation, particularly in terms of sequential structure. In this study, the aim is to analyse how participants maintain continuity and handle discontinuities in institutionally arranged, computer-mediated communication. The empirical material consists of chat log files from in-service training courses for professionals in the food production industry. In the chat sessions we analysed, participants initially had some problems in co-ordinating (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  8
    Push: software design and the cultural politics of music production.Mike D'Errico - 2022 - New York: Oxford University Press.
    Push: Software Design and the Cultural Politics of Music Production shows how changes in the design of music software in the first decades of the twenty-first century shaped the production techniques and performance practices of artists working across media, from hip-hop and electronic dance music to video games and mobile apps. Emerging alongside developments in digital music distribution such as peer-to-peer file sharing and the MP3 format, digital audio workstations like FL Studio and Ableton Live introduced design affordances that encouraged (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  9
    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television.Youwen Ma & Yi Wan - 2021 - Complexity 2021:1-10.
    Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. The method selects Hadoop open source cloud platform as the basis, combines the MapReduce distributed programming model and HDFS distributed file storage system and other key cloud computing technologies. In order to cope with different data processing needs of film and television industry, association analysis, cluster analysis, factor analysis, and K-mean + association analysis algorithm training model were applied to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  23
    Brittle System Analysis.Stephen F. Bush, John Hershey & Kirby Vosburgh - forthcoming - Arxiv Preprint Cs/9904016.
    The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  39
    Evolutionary Models of Leadership.Zachary H. Garfield, Robert L. Hubbard & Edward H. Hagen - 2019 - Human Nature 30 (1):23-58.
    This study tested four theoretical models of leadership with data from the ethnographic record. The first was a game-theoretical model of leadership in collective actions, in which followers prefer and reward a leader who monitors and sanctions free-riders as group size increases. The second was the dominance model, in which dominant leaders threaten followers with physical or social harm. The third, the prestige model, suggests leaders with valued skills and expertise are chosen by followers who strive to emulate them. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  36.  13
    Controlling Video Stimuli in Sign Language and Gesture Research: The OpenPoseR Package for Analyzing OpenPose Motion-Tracking Data in R.Patrick C. Trettenbrein & Emiliano Zaccarella - 2021 - Frontiers in Psychology 12.
    Researchers in the fields of sign language and gesture studies frequently present their participants with video stimuli showing actors performing linguistic signs or co-speech gestures. Up to now, such video stimuli have been mostly controlled only for some of the technical aspects of the video material, leaving open the possibility that systematic differences in video stimulus materials may be concealed in the actual motion properties of the actor’s movements. Computer vision methods such as OpenPose enable the fitting of body-pose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Correct grammar 3.0.Ci Abramson - 1991 - Journal of Mind and Behavior 12 (3):421-422.
    Correct Grammar is an easy to use, powerful and inexpensive grammar checker suitable for IBM personal computers and compatibles. It installs in minutes, is readily customized, and is designed to work with all major word processor programs such as WordPerfect, WordStar and Microsoft Works. It will also process ASCII files. I highly recommend Correct Grammar. It is a fine program.
     
    Export citation  
     
    Bookmark  
  38. Networks considered harmful - for electronic mail.John McCarthy - manuscript
    Electronic mail (email), using ARPANET and other networks has been in use for almost 20 years. The widespread use of telefax is more recent. However, unless email is freed from dependence on the networks, I predict it will be supplanted by telefax for most uses in spite of its many advantages over telefax. These advantages include the fact that information is transmitted more cheaply as character streams than as images. Multiple addressees are readily accommodated. Moreover, messages transmitted as character streams (...)
    No categories
     
    Export citation  
     
    Bookmark  
  39.  5
    Nikon D60 for Dummies.Julie Adair King - 2008 - For Dummies.
    You've decided to upgrade from your old point-and-shoot by purchasing the compact and economical Nikon D60, an SLR model without all the bulk. Now, make the most of your new digital camera by actually learning how to use all those options and settings! Take advantage of external controls and learn how to navigate the camera menus to fully customize internal options so that you can capture, share, and print photographs like a professional. You'll find out how to understand the controls, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Araucaria as a Tool for Diagramming Arguments in Teaching and Studying Philosophy .F. Macagno, D. Walton, G. Rowe & C. Reed - 2006 - Teaching Philosophy 29 (2):111-124,.
    This paper explains how to use a new software tool for argument diagramming available free on the Internet, showing especially how it can be used in the classroom to enhance critical thinking in philosophy. The user loads a text file containing an argument into a box on the computer interface, and then creates an argument diagram by dragging lines from one node to another. A key feature is the support for argumentation schemes, common patterns of defeasible reasoning historically know (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  41.  12
    Relational data paradigms: What do we learn by taking the materiality of databases seriously?Karen M. Wickett & Andrea K. Thomer - 2020 - Big Data and Society 7 (1).
    Although databases have been well-defined and thoroughly discussed in the computer science literature, the actual users of databases often have varying definitions and expectations of this essential computational infrastructure. Systems administrators and computer science textbooks may expect databases to be instantiated in a small number of technologies, but there are numerous examples of databases in non-conventional or unexpected technologies, such as spreadsheets or other assemblages of files linked through code. Consequently, we ask: How do the materialities of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  20
    Are University Students Ready to Dump Their Textbooks?Mark van Heerden, Jacques Ophoff & Jean-Paul Van Belle - 2012 - International Journal of Cyber Ethics in Education 2 (3):15-44.
    Today’s students are accustomed to a world where information is available on-demand, anywhere and anytime. They bring this expectation to their academic world where they want to work cooperatively and flexibly, using the modern information processing tools and access with which they are familiar. New hardware platforms such as e-Readers and tablet computers have made substantial inroads in the consumer market. E-Readers are becoming more prevalent in universities – replacing the need for physical textbooks, lecturing notes and other academic documents. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43. The Poetry of Jeroen Mettes.Samuel Vriezen & Steve Pearce - 2012 - Continent 2 (1):22-28.
    continent. 2.1 (2012): 22–28. Jeroen Mettes burst onto the Dutch poetry scene twice. First, in 2005, when he became a strong presence on the nascent Dutch poetry blogosphere overnight as he embarked on his critical project Dichtersalfabet (Poet’s Alphabet). And again in 2011, when to great critical acclaim (and some bafflement) his complete writings were published – almost five years after his far too early death. 2005 was the year in which Dutch poetry blogging exploded. That year saw the foundation (...)
     
    Export citation  
     
    Bookmark  
  44. The best game in town: The reemergence of the language-of-thought hypothesis across the cognitive sciences.Jake Quilty-Dunn, Nicolas Porot & Eric Mandelbaum - 2023 - Behavioral and Brain Sciences 46:e261.
    Mental representations remain the central posits of psychology after many decades of scrutiny. However, there is no consensus about the representational format(s) of biological cognition. This paper provides a survey of evidence from computational cognitive psychology, perceptual psychology, developmental psychology, comparative psychology, and social psychology, and concludes that one type of format that routinely crops up is the language-of-thought (LoT). We outline six core properties of LoTs: (i) discrete constituents; (ii) role-filler independence; (iii) predicate–argument structure; (iv) logical operators; (v) inferential (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  45. Virtual Reality Translation of Philippa Foot's Trolley Problem.Erick Ramirez, Scott LaBarge, Miles Elliott & Carl Maggio - manuscript
    A virtual reality translation of Philippa Foot's original "Trolley Problem." These modules are free to download and use in the classroom and for research/x-phi purposes. -/- *Requires an Oculus Rift or HTC Vive and VR capable computer. To open the files, uncompress the downloaded .zip folder and run the executable (.exe) file.
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  2
    Pc Magazine Printing Great Digital Photos.David Karlins - 2004 - Wiley.
    Packed with practical, hands on guidance, PC Magazine’s Guide to Printing Great Digital Photos is the perfect book for computer users who are looking to get that little bit extra out of their color printer investment. Digital print expert David Karlins guides readers through everything –from selecting the right kinds of ink and paper, calibrating your computer monitor and making colors match, to getting your images ready for printing and giving your photos that professional touch with a bit (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  29
    Intellectual Property and Theories of Justice.Axel Gosseries, Alain Marciano & Alain Strowel (eds.) - 2008 - Basingstoke & N.Y.: Palgrave McMillan.
    In this volume, fourteen philosophers, economists and legal scholars and one computer scientist address various facets of the same question: under which conditions (if any) can intellectual property rights be fair? This general question unfolds in a variety of others: What are the parallels and differences between intellectual and real property? Are libertarian theories especially sympathetic to IP rights? Should Rawlsian support copyright? How can a concern for incentives be taken into account by each of the main theories of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  22
    Redundancy in photography.Daniel Palmer - 2012 - Philosophy of Photography 3 (1):36-44.
    In his text, `Information strategies', written at the cusp of the emergence of digital photography in 1985, German artist and photography critic Andreas Müller-Pohle predicted that soon `it will be possible to generate and regenerate literally every conceivable - or inconceivable - picture through a computer terminal'. This realization coincided with Müller-Pohle's critique of conventional photography, which he dubbed `photographism' drawing on the philosopher Vilém Flusser's work. For Flusser, photographers are functionaries of an apparatus based on automation, programmed to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  49.  33
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  16
    Trainable watershed-based model for cornea endothelial cell segmentation.Ahmed Saifullah Sami & Mohd Shafry Mohd Rahim - 2022 - Journal of Intelligent Systems 31 (1):370-392.
    Segmentation of the medical image plays a significant role when it comes to diagnosis using computer aided system. This article focuses on the human corneal endothelium’s health, which is one of the filed research interests, especially in the human cornea. Various pathological environments fasten the extermination of the endothelial cells, which in turn decreases the cell density in an abnormal manner. Dead cells worsen the hexagonal design. The mutilated endothelial cells can no longer revive back and that gives room (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000