Results for ' computational strength'

1000+ found
Order:
  1.  20
    The computational strengths of α-tape infinite time Turing machines.Benjamin Rin - 2014 - Annals of Pure and Applied Logic 165 (9):1501-1511.
    In [7], open questions are raised regarding the computational strengths of so-called ∞-α -Turing machines, a family of models of computation resembling the infinite-time Turing machine model of [2], except with α -length tape . Let TαTα denote the machine model of tape length α . Define that TαTα is computationally stronger than TβTβ precisely when TαTα can compute all TβTβ-computable functions ƒ: min2→min2 plus more. The following results are found: Tω1≻TωTω1≻Tω. There are countable ordinals α such that Tα≻TωTα≻Tω, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  19
    Computing strength of structures related to the field of real numbers.Gregory Igusa, Julia F. Knight & Noah David Schweber - 2017 - Journal of Symbolic Logic 82 (1):137-150.
    In [8], the third author defined a reducibility$\le _w^{\rm{*}}$that lets us compare the computing power of structures of any cardinality. In [6], the first two authors showed that the ordered field of reals${\cal R}$lies strictly above certain related structures. In the present paper, we show that$\left \equiv _w^{\rm{*}}{\cal R}$. More generally, for the weak-looking structure${\cal R}$ℚconsisting of the real numbers with just the ordering and constants naming the rationals, allo-minimal expansions of${\cal R}$ℚare equivalent to${\cal R}$. Using this, we show that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  10
    The computational strength of matchings in countable graphs.Stephen Flood, Matthew Jura, Oscar Levin & Tyler Markkanen - 2022 - Annals of Pure and Applied Logic 173 (8):103133.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  14
    A Mathematical Commitment Without Computational Strength.Anton Freund - 2022 - Review of Symbolic Logic 15 (4):880-906.
    We present a new manifestation of Gödel’s second incompleteness theorem and discuss its foundational significance, in particular with respect to Hilbert’s program. Specifically, we consider a proper extension of Peano arithmetic ( $\mathbf {PA}$ ) by a mathematically meaningful axiom scheme that consists of $\Sigma ^0_2$ -sentences. These sentences assert that each computably enumerable ( $\Sigma ^0_1$ -definable without parameters) property of finite binary trees has a finite basis. Since this fact entails the existence of polynomial time algorithms, it is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  15
    Splitting into degrees with low computational strength.Rod Downey & Keng Meng Ng - 2018 - Annals of Pure and Applied Logic 169 (8):803-834.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  28
    The strength of compactness in Computability Theory and Nonstandard Analysis.Dag Normann & Sam Sanders - 2019 - Annals of Pure and Applied Logic 170 (11):102710.
  7.  30
    Effects of Attention on the Strength of Lexical Influences on Speech Perception: Behavioral Experiments and Computational Mechanisms.Daniel Mirman, James L. McClelland, Lori L. Holt & James S. Magnuson - 2008 - Cognitive Science 32 (2):398-417.
    The effects of lexical context on phonological processing are pervasive and there have been indications that such effects may be modulated by attention. However, attentional modulation in speech processing is neither well documented nor well understood. Experiment 1 demonstrated attentional modulation of lexical facilitation of speech sound recognition when task and critical stimuli were identical across attention conditions. We propose modulation of lexical activation as a neurophysiologically plausible computational mechanism that can account for this type of modulation. Contrary to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  8.  58
    Computer implication and the Curry paradox.Wayne Aitken & Jeffrey A. Barrett - 2004 - Journal of Philosophical Logic 33 (6):631-637.
    There are theoretical limitations to what can be implemented by a computer program. In this paper we are concerned with a limitation on the strength of computer implemented deduction. We use a version of the Curry paradox to arrive at this limitation.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  9.  25
    Computational adequacy for recursive types in models of intuitionistic set theory.Alex Simpson - 2004 - Annals of Pure and Applied Logic 130 (1-3):207-275.
    This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. Our approach is to view such models as full subcategories of categorical models of intuitionistic set theory. It is shown that the existence of solutions to recursive domain equations depends upon the strength of the set theory. We observe that the internal set theory of an elementary topos is not strong enough to guarantee their existence. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  10. Computational Correlates of Consciousness.Axel Cleeremans - 1963 - In Steven Laureys (ed.), The Boundaries of Consciousness: Neurobiology and Neuropathology: Progress in Brain Research. Elsevier.
    Over the past few years numerous proposals have appeared that attempt to characterize consciousness in terms of what could be called its computational correlates: Principles of information processing with which to characterize the differences between conscious and unconscious processing. Proposed computational correlates include architectural specialization (such as the involvement of specific regions of the brain in conscious processing), properties of representations (such as their stability in time or their strength), and properties of specific processes (such as resonance, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  11. On the strength of Ramsey's theorem for pairs.Peter A. Cholak, Carl G. Jockusch & Theodore A. Slaman - 2001 - Journal of Symbolic Logic 66 (1):1-55.
    We study the proof-theoretic strength and effective content of the infinite form of Ramsey's theorem for pairs. Let RT n k denote Ramsey's theorem for k-colorings of n-element sets, and let RT $^n_{ denote (∀ k)RT n k . Our main result on computability is: For any n ≥ 2 and any computable (recursive) k-coloring of the n-element sets of natural numbers, there is an infinite homogeneous set X with X'' ≤ T 0 (n) . Let IΣ n and (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  12.  17
    Computability theory, nonstandard analysis, and their connections.Dag Normann & Sam Sanders - 2019 - Journal of Symbolic Logic 84 (4):1422-1465.
    We investigate the connections between computability theory and Nonstandard Analysis. In particular, we investigate the two following topics and show that they are intimately related. A basic property of Cantor space$2^ $ is Heine–Borel compactness: for any open covering of $2^ $, there is a finite subcovering. A natural question is: How hard is it to compute such a finite subcovering? We make this precise by analysing the complexity of so-called fan functionals that given any $G:2^ \to $, output a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  13.  34
    On the strength of marriage theorems and uniformity.Makoto Fujiwara, Kojiro Higuchi & Takayuki Kihara - 2014 - Mathematical Logic Quarterly 60 (3):136-153.
    Kierstead showed that every computable marriage problem has a computable matching under the assumption of computable expanding Hall condition and computable local finiteness for boys and girls. The strength of the marriage theorem reaches or if computable expanding Hall condition or computable local finiteness for girls is weakened. In contrast, the provability of the marriage theorem is maintained in even if local finiteness for boys is completely removed. Using these conditions, we classify the strength of variants of marriage (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  25
    Embeddings between well-orderings: Computability-theoretic reductions.Jun Le Goh - 2020 - Annals of Pure and Applied Logic 171 (6):102789.
    We study the computational content of various theorems with reverse mathematical strength around Arithmetical Transfinite Recursion (ATR_0) from the point of view of computability-theoretic reducibilities, in particular Weihrauch reducibility. Our main result states that it is equally hard to construct an embedding between two given well-orderings, as it is to construct a Turing jump hierarchy on a given well-ordering. This answers a question of Marcone. We obtain a similar result for Fraïssé's conjecture restricted to well-orderings.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  48
    Computer-assisted decision making in medicine.A. Feigenbaum Edward - 1984 - Journal of Medicine and Philosophy 9 (2).
    This article reviews the strengths and limitations of five major paradigms of medical computer-assisted decision making (CADM): (1) clinical algorithms, (2) statistical analysis of collections of patient data, (3) mathematical models of physical processes, (4) decision analysis, and (5) symbolic reasoning or artificial intelligence (Al). No one technique is best for all applications, and there is recent promising work which combines two or more established techniques. We emphasize both the inherent power of symbolic reasoning and the promise of artificial intelligence (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  40
    The Strength of Desires: A Logical Approach.Didier Dubois, Emiliano Lorini & Henri Prade - 2017 - Minds and Machines 27 (1):199-231.
    The aim of this paper is to propose a formal approach to reasoning about desires, understood as logical propositions which we would be pleased to make true, also acknowledging the fact that desire is a matter of degree. It is first shown that, at the static level, desires should satisfy certain principles that differ from those to which beliefs obey. In this sense, from a static perspective, the logic of desires is different from the logic of beliefs. While the accumulation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  31
    Computer-Assisted Decision Making in Medicine.J. C. Kunz, E. H. Shortliffe, B. G. Buchanan & E. A. Feigenbaum - 1984 - Journal of Medicine and Philosophy 9 (2):135-160.
    This article reviews the strengths and limitations of five major paradigms of medical computer-assisted decision making (CADM): (1) clinical algorithms, (2) statistical analysis of collections of patient data, (3) mathematical models of physical processes, (4) decision analysis, and (5) symbolic reasoning or artificial intelligence (Al). No one technique is best for all applications, and there is recent promising work which combines two or more established techniques. We emphasize both the inherent power of symbolic reasoning and the promise of artificial intelligence (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  5
    Casuistry and Computer Ethics.Karigwen Coleman - 2007 - Metaphilosophy 38 (4):471-488.
    At the heart of the uniqueness debate is the possibility that the computer revolution may demand more in the way of ethical analysis than our traditional (that is, modern) ethical edification has prepared us for. In short, it may present new and unique problems and therefore demand new and unique solutions. In this article I argue that the solution is in fact an old and not‐so‐unique one: casuistry. Appealing to Jonsen and Toulmin's analysis of casuistry (1988), I argue that a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Descriptive Complexity, Computational Tractability, and the Logical and Cognitive Foundations of Mathematics.Markus Pantsar - 2020 - Minds and Machines 31 (1):75-98.
    In computational complexity theory, decision problems are divided into complexity classes based on the amount of computational resources it takes for algorithms to solve them. In theoretical computer science, it is commonly accepted that only functions for solving problems in the complexity class P, solvable by a deterministic Turing machine in polynomial time, are considered to be tractable. In cognitive science and philosophy, this tractability result has been used to argue that only functions in P can feasibly work (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  20.  25
    A journey through computability, topology and analysis.Manlio Valenti - 2022 - Bulletin of Symbolic Logic 28 (2):266-267.
    This thesis is devoted to the exploration of the complexity of some mathematical problems using the framework of computable analysis and descriptive set theory. We will especially focus on Weihrauch reducibility as a means to compare the uniform computational strength of problems. After a short introduction of the relevant background notions, we investigate the uniform computational content of problems arising from theorems that lie at the higher levels of the reverse mathematics hierarchy.We first analyze the strength (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  28
    Casuistry and computer ethics.Kari Gwen Coleman - 2007 - Metaphilosophy 38 (4):471-488.
    At the heart of the uniqueness debate is the possibility that the computer revolution may demand more in the way of ethical analysis than our traditional (that is, modern) ethical edification has prepared us for. In short, it may present new and unique problems and therefore demand new and unique solutions. In this article I argue that the solution is in fact an old and not‐so‐unique one: casuistry. Appealing to Jonsen and Toulmin's analysis of casuistry (1988), I argue that a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  11
    Strength in coalitions: Community detection through argument similarity.Paola Daniela Budán, Melisa Gisselle Escañuela Gonzalez, Maximiliano Celmo David Budán, Maria Vanina Martinez & Guillermo Ricardo Simari - 2023 - Argument and Computation 14 (3):275-325.
    We present a novel argumentation-based method for finding and analyzing communities in social media on the Web, where a community is regarded as a set of supported opinions that might be in conflict. Based on their stance, we identify argumentative coalitions to define them; then, we apply a similarity-based evaluation method over the set of arguments in the coalition to determine the level of cohesion inherent to each community, classifying them appropriately. Introducing conflict points and attacks between coalitions based on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  51
    Partition theorems and computability theory.Joseph R. Mileti - 2005 - Bulletin of Symbolic Logic 11 (3):411-427.
    The connections between mathematical logic and combinatorics have a rich history. This paper focuses on one aspect of this relationship: understanding the strength, measured using the tools of computability theory and reverse mathematics, of various partition theorems. To set the stage, recall two of the most fundamental combinatorial principles, König's Lemma and Ramsey's Theorem. We denote the set of natural numbers by ω and the set of finite sequences of natural numbers by ω<ω. We also identify each n ∈ (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  24. When will computer hardware match the human brain?Hans Moravec - 1998 - Journal of Evolution and Technology 1 (1):10.
    Computers have far to go to match human strengths, and our estimates will depend on analogy and extrapolation. Fortunately, these are grounded in the first bit of the journey, now behind us. Thirty years of computer vision reveals that 1 MIPS can extract simple features from real-time imagery--tracking a white line or a white spot on a mottled background. 10 MIPS can follow complex gray-scale patches--as smart bombs, cruise missiles and early self-driving vans attest. 100 MIPS can follow moderately unpredictable (...)
     
    Export citation  
     
    Bookmark   28 citations  
  25.  39
    The veblen functions for computability theorists.Alberto Marcone & Antonio Montalbán - 2011 - Journal of Symbolic Logic 76 (2):575 - 602.
    We study the computability-theoretic complexity and proof-theoretic strength of the following statements: (1) "If X is a well-ordering, then so is ε X ", and (2) "If X is a well-ordering, then so is φ(α, X)", where α is a fixed computable ordinal and φ represents the two-placed Veblen function. For the former statement, we show that ω iterations of the Turing jump are necessary in the proof and that the statement is equivalent to ${\mathrm{A}\mathrm{C}\mathrm{A}}_{0}^{+}$ over RCA₀. To prove (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  26.  29
    The strength of the Grätzer-Schmidt theorem.Katie Brodhead, Mushfeq Khan, Bjørn Kjos-Hanssen, William A. Lampe, Paul Kim Long V. Nguyen & Richard A. Shore - 2016 - Archive for Mathematical Logic 55 (5-6):687-704.
    The Grätzer-Schmidt theorem of lattice theory states that each algebraic lattice is isomorphic to the congruence lattice of an algebra. We study the reverse mathematics of this theorem. We also show thatthe set of indices of computable lattices that are complete is Π11\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Pi ^1_1$$\end{document}-complete;the set of indices of computable lattices that are algebraic is Π11\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Pi ^1_1$$\end{document}-complete;the set of compact elements of a computable (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  27.  10
    Computability of diagrammatic theories for normative positions.Matteo Pascucci & Giovanni Sileno - 2021 - In Erich Schweighofer (ed.), Legal Knowledge and Information Systems. Proceedings of JURIX 2021. IOS Press. pp. 171-180.
    Normative positions are sometimes illustrated in diagrams, in particular in didactic contexts. Traditional examples are the Aristotelian polygons of opposition for deontic modalities (squares, triangles, hexagons, etc.), and the Hohfeldian squares for obligative and potestative concepts. Relying on previous work, we show that Hohfeld’s framework can be used as a basis for developing several Aristotelian polygons and more complex diagrams. Then, we illustrate how logical theories of increasing strength can be built based on these diagrams, and how those theories (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  22
    Comparing the Strength of Diagonally Nonrecursive Functions in the Absence of Induction.François G. Dorais, Jeffry L. Hirst & Paul Shafer - 2015 - Journal of Symbolic Logic 80 (4):1211-1235.
    We prove that the statement “there is aksuch that for everyfthere is ak-bounded diagonally nonrecursive function relative tof” does not imply weak König’s lemma over${\rm{RC}}{{\rm{A}}_0} + {\rm{B\Sigma }}_2^0$. This answers a question posed by Simpson. A recursion-theoretic consequence is that the classic fact that everyk-bounded diagonally nonrecursive function computes a 2-bounded diagonally nonrecursive function may fail in the absence of${\rm{I\Sigma }}_2^0$.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  18
    A computational approach for creativity assessment of culinary products: the case of elBulli.Antonio Jimenez-Mavillard & Juan Luis Suarez - 2022 - AI and Society 37 (1):331-353.
    In recent years, the gastronomy industry has increased the demand for rigorous and reliable tools to evaluate culinary creativity; but conceptually, creativity is difficult to define and even more difficult to measure. In this paper, we propose an AI-based method for assessing culinary product creativity by using the renowned high cuisine restaurant elBulli as a case study to understand the proliferation and scale of an entity’s creativity and innovation. To achieve so, we trained a Random Forest Classifier to assess the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  34
    Machines, computers, dialectics: A new look at human intelligence. [REVIEW]Gerald Heidegger - 1992 - AI and Society 6 (1):27-40.
    The more recent computer developments cause us to take a new look at human intelligence. The prevailing occidental view of human intelligence represents a very one-sided, logocentric approach, so that it is becoming more urgent to look for a more complete view. In this way, specific strengths of so-called human information processing are becoming particularly evident in a new way. To provide a general substantiation for this view, some elements of a phenomenological model for a dialectical coherence of human expressions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  21
    United we stand: Accruals in strength-based argumentation.Julien Rossit, Jean-Guy Mailly, Yannis Dimopoulos & Pavlos Moraitis - 2021 - Argument and Computation 12 (1):87-113.
    Argumentation has been an important topic in knowledge representation, reasoning and multi-agent systems during the last twenty years. In this paper, we propose a new abstract framework where arguments are associated with a strength, namely a quantitative information which is used to determine whether an attack between arguments succeeds or not. Our Strength-based Argumentation Framework combines ideas of Preference-based and Weighted Argumentation Frameworks in an original way, which permits to define acceptability semantics sensitive to the existence of accruals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  39
    Intellectual property rights and computer software.John Weckert - 1997 - Business Ethics, the Environment and Responsibility 6 (2):101–109.
    ‘It is much more difficult than is often admitted to make a strong case for the ownership of computer software.’ This closely argued study of the strengths and weaknesses of the case for intellectual property rights and against software piracy is based on material contained in the author’s joint work with Douglas Adeney, Computer and Information Ethics, Greenwood Press, an imprint of Greenwood Publishing Group, INC., Westport, CT, forthcoming May, 1997. The author is a member of the School of Information (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  87
    Pancomputationalism and the Computational Description of Physical Systems.Neal G. Anderson & Gualtiero Piccinini - manuscript
    According to pancomputationalism, all physical systems – atoms, rocks, hurricanes, and toasters – perform computations. Pancomputationalism seems to be increasingly popular among some philosophers and physicists. In this paper, we interpret pancomputationalism in terms of computational descriptions of varying strengthcomputational interpretations of physical microstates and dynamics that vary in their restrictiveness. We distinguish several types of pancomputationalism and identify essential features of the computational descriptions required to support them. By tying various pancomputationalist theses directly to notions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  7
    The Vindication of Computer Simulations.Nicolas Fillion - 2017 - In Martin Carrier & Johannes Lenhard (eds.), Mathematics as a Tool: Tracing New Roles of Mathematics in the Sciences. Springer Verlag.
    The relatively recent increase in prominence of computer simulations in scientific inquiry gives us more reasons than ever before for asserting that mathematics is a wonderful tool. In fact, a practical knowledge of scientific computation has become essential for scientists working in all disciplines involving mathematics. Despite their incontestable success, it must be emphasized that the numerical methods subtending simulations provide at best approximate solutions and that they can also return very misleading results. Accordingly, epistemological sobriety demands that we clarify (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  21
    The intuitionistic fragment of computability logic at the propositional level.Giorgi Japaridze - 2007 - Annals of Pure and Applied Logic 147 (3):187-227.
    This paper presents a soundness and completeness proof for propositional intuitionistic calculus with respect to the semantics of computability logic. The latter interprets formulas as interactive computational problems, formalized as games between a machine and its environment. Intuitionistic implication is understood as algorithmic reduction in the weakest possible — and hence most natural — sense, disjunction and conjunction as deterministic-choice combinations of problems , and “absurd” as a computational problem of universal strength.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  36.  42
    On the Strength of some Semi-Constructive Theories.Solomon Feferman - 2012 - In Ulrich Berger, Hannes Diener, Peter Schuster & Monika Seisenberger (eds.), Logic, Construction, Computation. De Gruyter. pp. 201-226.
    Most axiomatizations of set theory that have been treated metamathematically have been based either entirely on classical logic or entirely on intuitionistic logic. But a natural conception of the settheoretic universe is as an indefinite (or “potential”) totality, to which intuitionistic logic is more appropriately applied, while each set is taken to be a definite (or “completed”) totality, for which classical logic is appropriate; so on that view, set theory should be axiomatized on some correspondingly mixed basis. Similarly, in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37.  34
    Time and Singular Causation—A Computational Model.Simon Stephan, Ralf Mayrhofer & Michael R. Waldmann - 2020 - Cognitive Science 44 (7):e12871.
    Causal queries about singular cases, which inquire whether specific events were causally connected, are prevalent in daily life and important in professional disciplines such as the law, medicine, or engineering. Because causal links cannot be directly observed, singular causation judgments require an assessment of whether a co‐occurrence of two events c and e was causal or simply coincidental. How can this decision be made? Building on previous work by Cheng and Novick (2005) and Stephan and Waldmann (2018), we propose a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  38.  55
    Euclidean Functions of Computable Euclidean Domains.Rodney G. Downey & Asher M. Kach - 2011 - Notre Dame Journal of Formal Logic 52 (2):163-172.
    We study the complexity of (finitely-valued and transfinitely-valued) Euclidean functions for computable Euclidean domains. We examine both the complexity of the minimal Euclidean function and any Euclidean function. Additionally, we draw some conclusions about the proof-theoretical strength of minimal Euclidean functions in terms of reverse mathematics.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  13
    Characterizing Human Expertise Using Computational Metrics of Feature Diagnosticity in a Pattern Matching Task.Thomas Busey, Dimitar Nikolov, Chen Yu, Brandi Emerick & John Vanderkolk - 2017 - Cognitive Science 41 (7):1716-1759.
    Forensic evidence often involves an evaluation of whether two impressions were made by the same source, such as whether a fingerprint from a crime scene has detail in agreement with an impression taken from a suspect. Human experts currently outperform computer-based comparison systems, but the strength of the evidence exemplified by the observed detail in agreement must be evaluated against the possibility that some other individual may have created the crime scene impression. Therefore, the strongest evidence comes from features (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  56
    Inaccessible set axioms may have little consistency strength.L. Crosilla & M. Rathjen - 2002 - Annals of Pure and Applied Logic 115 (1-3):33-70.
    The paper investigates inaccessible set axioms and their consistency strength in constructive set theory. In ZFC inaccessible sets are of the form Vκ where κ is a strongly inaccessible cardinal and Vκ denotes the κth level of the von Neumann hierarchy. Inaccessible sets figure prominently in category theory as Grothendieck universes and are related to universes in type theory. The objective of this paper is to show that the consistency strength of inaccessible set axioms heavily depend on the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  22
    Computer-assisted safety argument review – a dialectics approach.Tangming Yuan, Tim Kelly & Tianhua Xu - 2015 - Argument and Computation 6 (2):130-148.
    There has been increasing use of argument-based approaches in the development of safety-critical systems. Within this approach, a safety case plays a key role in the system development life cycle. The key components in a safety case are safety arguments, which are designated to demonstrate that the system is acceptably safe. Inappropriate reasoning in safety arguments could undermine a system's safety claims which in turn contribute to safety-related failures of the system. The review of safety arguments is therefore a crucial (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  42.  9
    Intellectual Property Rights and Computer Software.John Weckert - 1997 - Business Ethics, the Environment and Responsibility 6 (2):101-109.
    ‘It is much more difficult than is often admitted to make a strong case for the ownership of computer software.’ This closely argued study of the strengths and weaknesses of the case for intellectual property rights and against software piracy is based on material contained in the author’s joint work with Douglas Adeney, Computer and Information Ethics, Greenwood Press, an imprint of Greenwood Publishing Group, INC., Westport, CT, forthcoming May, 1997. The author is a member of the School of Information (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  29
    Argumentative Ordering of Utterances for Language Generation in Multi-party Human–Computer Dialogue.Vladimir Popescu & Jean Caelen - 2009 - Argumentation 23 (2):205-237.
    In trying to control various aspects concerning utterance production in multi-party human–computer dialogue, argumentative considerations play an important part, particularly in choosing appropriate lexical units so that we fine-tune the degree of persuasion that each utterance has. A preliminary step in this endeavor is the ability to place an ordering relation between semantic forms (that are due to be realized as utterances, by the machine), concerning their persuasion strength, with respect to certain (explicit or implicit) conclusions. Thus, in this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  21
    New Frontiers in Computer-Assisted Career Guidance Systems (CACGS): Implications From Career Construction Theory.S. Alvin Leung - 2022 - Frontiers in Psychology 13.
    This article addresses the use of computer-assisted career guidance systems in career interventions. Major CACGS developed in the past decades were based on the trait-factor or person-environment fit approaches in their conceptualization and design. The strengths and limitations of these CACGS in addressing the career development needs of individuals are discussed. The Career Construction Theory is a promising paradigm to guide the development of new generations of CACGS. The narrative tradition, career adaptability model, and life-design interventions of CCT offer rich (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  20
    Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength.Simon Wells, Marcin Selinger, David Godden, Kamila Dębowska-Kozłowska & Frank Zenker - 2023 - Studies in Logic, Grammar and Rhetoric 68 (1):133-167.
    Different approaches analyze the strength of a natural language argument in different ways. This paper contrasts the dialectical, structural, probabilistic (or Bayesian), computational, and empirical approaches by exemplarily applying them to a single argumentative text (Epicureans on Squandering Life; Aikin & Talisse, 2019). Rather than pitching these approaches against one another, our main goal is to show the room for fruitful interaction. Our focus is on a dialectical analysis of the squandering argument as an argumentative response that voids (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  27
    How localized are computational templates? A machine learning approach.Maximilian Noichl - 2023 - Synthese 201 (3):1-22.
    A commonly held background assumption about the sciences is that they connect along borders characterized by ontological or explanatory relationships, usually given in the order of mathematics, physics, chemistry, biology, psychology, and the social sciences. Interdisciplinary work, in this picture, arises in the connecting regions of adjacent disciplines. Philosophical research into interdisciplinary model transfer has increasingly complicated this picture by highlighting additional connections orthogonal to it. But most of these works have been done through case studies, which due to their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  69
    A normative comparison of threshold views through computer simulations.Alice C. W. Huang - 2022 - Synthese 200 (4):1-23.
    The threshold view says that a person forms an outright belief P if and only if her credence for P reaches a certain threshold. Using computer simulations, I compare different versions of the threshold view to understand how they perform under time pressure in decision problems. The results illuminate the strengths and weaknesses of the various cognitive strategies in different decision contexts. A threshold view that performs well across diverse contexts is likely to be a cognitively flexible and context-dependent fusion (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  11
    Current Issues in Computing and Philosophy.P. Brey, A. Briggle & K. Waelbers (eds.) - 2008 - IOS Press.
    The theme of this volume is the multi-faceted 'computational turn' that is occurring through the interaction of the disciplines of philosophy and computing. In computer and information sciences, there are significant conceptual and methodological questions that require reflection and analysis. Moreover, digital, information and communication technologies have had tremendous impact on society, which raises further philosophical questions. This book tries to facilitate the task to continuously work to ensure that its diversity of perspectives and methods proves a source of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  43
    Diagnosis by computer.Ernan McMullin - 1983 - Journal of Medicine and Philosophy 8 (1):5-28.
    The most ambitious simulation approach to computer-aided diagnosis is probably that of CADUCEUS. A review of its strategies may be expected to reveal some, at least, of the strengths and weaknesses of this approach, as well as to turn up problems of interest to the philosopher of science concerned with the logical structures implicit in the process of diagnostic judgment. CiteULike Connotea Del.icio.us What's this?
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  40
    Effect of mindfulness meditation on brain–computer interface performance.Lee-Fan Tan, Zoltan Dienes, Ashok Jansari & Sing-Yau Goh - 2014 - Consciousness and Cognition 23:12-21.
    Electroencephalogram based Brain–Computer Interfaces enable stroke and motor neuron disease patients to communicate and control devices. Mindfulness meditation has been claimed to enhance metacognitive regulation. The current study explores whether mindfulness meditation training can thus improve the performance of BCI users. To eliminate the possibility of expectation of improvement influencing the results, we introduced a music training condition. A norming study found that both meditation and music interventions elicited clear expectations for improvement on the BCI task, with the strength (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 1000