Results for 'DES Algorithm'

961 found
Order:
  1.  1
    Source code obfuscation with genetic algorithms using LLVM code optimizations.Juan Carlos de la Torre, Javier Jareño, José Miguel Aragón-Jurado, Sébastien Varrette & Bernabé Dorronsoro - forthcoming - Logic Journal of the IGPL.
    With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems. If novel paradigm as confidential computing aims at protecting the data manipulated during the execution, obfuscating techniques (in particular at the source code level) remain a popular solution to conceal the purpose of a program or its logic without altering its functionality, thus preventing reverse-engineering (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Algorithmic Decision-Making Based on Machine Learning from Big Data: Can Transparency Restore Accountability?Paul B. de Laat - 2018 - Philosophy and Technology 31 (4):525-541.
    Decision-making assisted by algorithms developed by machine learning is increasingly determining our lives. Unfortunately, full opacity about the process is the norm. Would transparency contribute to restoring accountability for such systems as is often maintained? Several objections to full transparency are examined: the loss of privacy when datasets become public, the perverse effects of disclosure of the very algorithms themselves, the potential loss of companies’ competitive edge, and the limited gains in answerability to be expected since sophisticated algorithms usually are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  3.  19
    Algorithmic decision-making employing profiling: will trade secrecy protection render the right to explanation toothless?Paul B. de Laat - 2022 - Ethics and Information Technology 24 (2).
    Algorithmic decision-making based on profiling may significantly affect people’s destinies. As a rule, however, explanations for such decisions are lacking. What are the chances for a “right to explanation” to be realized soon? After an exploration of the regulatory efforts that are currently pushing for such a right it is concluded that, at the moment, the GDPR stands out as the main force to be reckoned with. In cases of profiling, data subjects are granted the right to receive meaningful information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Identity, profiling algorithms and a world of ambient intelligence.Katja de Vries - 2010 - Ethics and Information Technology 12 (1):71-85.
    The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently used by internet companies such as Amazon , even more important than it is today. I argue that the way in which we experience ourselves necessarily goes (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  5.  4
    Structural analysis of code-based algorithms of the NIST post-quantum call.M. A. González de la Torre, L. Hernández Encinas & J. I. Sánchez García - forthcoming - Logic Journal of the IGPL.
    Code-based cryptography is currently the second most promising post-quantum mathematical tool for quantum-resistant algorithms. Since in 2022 the first post-quantum standard Key Encapsulation Mechanism, Kyber (a latticed-based algorithm), was selected to be established as standard, and after that the National Institute of Standards and Technology post-quantum standardization call focused in code-based cryptosystems. Three of the four candidates that remain in the fourth round are code-based algorithms. In fact, the only non-code-based algorithm (SIKE) is now considered vulnerable. Due to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  47
    Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient consideration (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  7.  10
    Algorithmic anxiety: Masks and camouflage in artistic imaginaries of facial recognition algorithms.Willem Schinkel & Patricia de Vries - 2019 - Big Data and Society 6 (1).
    This paper discusses prominent examples of what we call “algorithmic anxiety” in artworks engaging with algorithms. In particular, we consider the ways in which artists such as Zach Blas, Adam Harvey and Sterling Crispin design artworks to consider and critique the algorithmic normativities that materialize in facial recognition technologies. Many of the artworks we consider center on the face, and use either camouflage technology or forms of masking to counter the surveillance effects of recognition technologies. Analyzing their works, we argue (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  53
    Algorithmic governance: Developing a research agenda through the power of collective intelligence.Kalpana Shankar, Burkhard Schafer, Niall O'Brolchain, Maria Helen Murphy, John Morison, Su-Ming Khoo, Muki Haklay, Heike Felzmann, Aisling De Paor, Anthony Behan, Rónán Kennedy, Chris Noone, Michael J. Hogan & John Danaher - 2017 - Big Data and Society 4 (2).
    We are living in an algorithmic age where mathematics and computer science are coming together in powerful new ways to influence, shape and guide our behaviour and the governance of our societies. As these algorithmic governance structures proliferate, it is vital that we ensure their effectiveness and legitimacy. That is, we need to ensure that they are an effective means for achieving a legitimate policy goal that are also procedurally fair, open and unbiased. But how can we ensure that algorithmic (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   18 citations  
  9. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  10.  35
    Towards a pragmatist dealing with algorithmic bias in medical machine learning.Georg Starke, Eva De Clercq & Bernice S. Elger - 2021 - Medicine, Health Care and Philosophy 24 (3):341-349.
    Machine Learning (ML) is on the rise in medicine, promising improved diagnostic, therapeutic and prognostic clinical tools. While these technological innovations are bound to transform health care, they also bring new ethical concerns to the forefront. One particularly elusive challenge regards discriminatory algorithmic judgements based on biases inherent in the training data. A common line of reasoning distinguishes between justified differential treatments that mirror true disparities between socially salient groups, and unjustified biases which do not, leading to misdiagnosis and erroneous (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  43
    Big data and algorithmic decision-making.Paul B. de Laat - 2017 - Acm Sigcas Computers and Society 47 (3):39-53.
    Decision-making assisted by algorithms developed by machine learning is increasingly determining our lives. Unfortunately, full opacity about the process is the norm. Can transparency contribute to restoring accountability for such systems? Several objections are examined: the loss of privacy when data sets become public, the perverse effects of disclosure of the very algorithms themselves, the potential loss of competitive edge, and the limited gains in answerability to be expected since sophisticated algorithms are inherently opaque. It is concluded that transparency is (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  19
    The open texture of ‘algorithm’ in legal language.Davide Baldini & Matteo De Benedetto - forthcoming - AI and Society.
    In this paper, we will survey the different uses of the term algorithm in contemporary legal practice. We will argue that the concept of algorithm currently exhibits a substantial degree of open texture, co-determined by the open texture of the concept of algorithm itself and by the open texture inherent to legal discourse. We will substantiate our argument by virtue of a case study, in which we analyze a recent jurisprudential case where the first and second-degree judges (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  36
    Equivalences Among Polarity Algorithms.José-de-Jesús Lavalle-Martínez, Manuel Montes-Y.-Gómez, Luis Villaseñor-Pineda, Héctor Jiménez-Salazar & Ismael-Everardo Bárcenas-Patiño - 2018 - Studia Logica 106 (2):371-395.
    The concept of polarity is pervasive in natural language. It relates syntax, semantics and pragmatics narrowly, Semantics: an international handbook of natural language meaning, De Gruyter Mouton, Berlin, 2011; Israel in The grammar of polarity: pragmatics, sensitivity, and the logic of scales, Cambridge studies in linguistics, Cambridge University Press, Cambridge, 2014), it refers to items of many syntactic categories such as nouns, verbs and adverbs. Neutral polarity items appear in affirmative and negative sentences, negative polarity items cannot appear in affirmative (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Algorithmic Aspects in Complex Systems Analysis.A. De Luca - 1971 - Scientia 65 (6):659.
    No categories
     
    Export citation  
     
    Bookmark  
  15.  3
    Les risques concernant l’utilisation des algorithmes dits prédictifs dans le domaine sensible de la justice.Éric Filiol - 2018 - Archives de Philosophie du Droit 60 (1):147-152.
    L’utilisation de techniques prédictives dans le processus de la justice, avec le développement des techniques de fouille et d’analyse des données, est considérée non seulement comme une évolution nécessaire mais encore plus comme une révolution de nature à optimiser et à rationaliser la gestion du justiciable. Cet article se propose d’exposer en quoi cette évolution est porteuse de risques, quels sont les enjeux, certains importants et surtout pourquoi il est illusoire d’espérer quelque chose de positif pour les procédures judiciaires.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  40
    “Google Told Me So!” On the Bent Testimony of Search Engine Algorithms.Devesh Narayanan & David De Cremer - 2022 - Philosophy and Technology 35 (2):1-19.
    Search engines are important contemporary sources of information and contribute to shaping our beliefs about the world. Each time they are consulted, various algorithms filter and order content to show us relevant results for the inputted search query. Because these search engines are frequently and widely consulted, it is necessary to have a clear understanding of the distinctively epistemic role that these algorithms play in the background of our online experiences. To aid in such understanding, this paper argues that search (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  23
    Bias in algorithms of AI systems developed for COVID-19: A scoping review.Janet Delgado, Alicia de Manuel, Iris Parra, Cristian Moyano, Jon Rueda, Ariel Guersenzvaig, Txetxu Ausin, Maite Cruz, David Casacuberta & Angel Puyol - 2022 - Journal of Bioethical Inquiry 19 (3):407-419.
    To analyze which ethically relevant biases have been identified by academic literature in artificial intelligence algorithms developed either for patient risk prediction and triage, or for contact tracing to deal with the COVID-19 pandemic. Additionally, to specifically investigate whether the role of social determinants of health have been considered in these AI developments or not. We conducted a scoping review of the literature, which covered publications from March 2020 to April 2021. ​Studies mentioning biases on AI algorithms developed for contact (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  15
    A bottom-up algorithm for solving ♯2SAT.Guillermo De Ita, J. Raymundo Marcial-Romero & J. A. HernÁndez-ServÍn - 2020 - Logic Journal of the IGPL 28 (6):1130-1140.
    Counting models for a two conjunctive formula $F$, a problem known as $\sharp $2Sat, is a classic $\sharp $P complete problem. Given a 2-CF $F$ as input, its constraint graph $G$ is built. If $G$ is acyclic, then $\sharp $2Sat can be computed efficiently. In this paper, we address the case when $G$ has cycles. When $G$ is cyclic, we propose a decomposition on the constraint graph $G$ that allows the computation of $\sharp $2Sat in incremental way. Let $T$ be (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  75
    The disciplinary power of predictive algorithms: a Foucauldian perspective.Paul B. de Laat - 2019 - Ethics and Information Technology 21 (4):319-329.
    Big Data are increasingly used in machine learning in order to create predictive models. How are predictive practices that use such models to be situated? In the field of surveillance studies many of its practitioners assert that “governance by discipline” has given way to “governance by risk”. The individual is dissolved into his/her constituent data and no longer addressed. I argue that, on the contrary, in most of the contexts where predictive modelling is used, it constitutes Foucauldian discipline. Compliance to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  20.  43
    What is morally at stake when using algorithms to make medical diagnoses? Expanding the discussion beyond risks and harms.Bas de Boer & Olya Kudina - 2021 - Theoretical Medicine and Bioethics 42 (5):245-266.
    In this paper, we examine the qualitative moral impact of machine learning-based clinical decision support systems in the process of medical diagnosis. To date, discussions about machine learning in this context have focused on problems that can be measured and assessed quantitatively, such as by estimating the extent of potential harm or calculating incurred risks. We maintain that such discussions neglect the qualitative moral impact of these technologies. Drawing on the philosophical approaches of technomoral change and technological mediation theory, which (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  73
    Vehicle Type Recognition Algorithm Based on Improved Network in Network.Erxi Zhu, Min Xu & De Chang Pi - 2021 - Complexity 2021:1-10.
    Vehicle type recognition algorithms are broadly used in intelligent transportation, but the accuracy of the algorithms cannot meet the requirements of production application. For the high efficiency of the multilayer perceptive layer of Network in Network, the nonlinear features of local receptive field images can be extracted. Global average pooling can avoid the network from overfitting, and small convolution kernel can decrease the dimensionality of the feature map, as well as downregulate the number of model training parameters. On that basis, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22. Real Attribute Learning Algorithm.Julio Michael Stern, Marcelo de Souza Lauretto, Fabio Nakano & Celma de Oliveira Ribeiro - 1998 - ISAS-SCI’98 2:315-321.
    This paper presents REAL, a Real-Valued Attribute Classification Tree Learning Algorithm. Several of the algorithm's unique features are explained by úe users' demands for a decision support tool to be used for evaluating financial operations strategies. Compared to competing algorithms, in our applications, REAL presents maj or advantages : (1) The REAL classification trees usually have smaller error rates. (2) A single conviction (or trust) measure at each leaf is more convenient than the traditional (probability, confidence-level) pair. (3) (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  12
    Pareto optimal allocation under uncertain preferences: uncertainty models, algorithms, and complexity.Haris Aziz, Péter Biró, Ronald de Haan & Baharak Rastegari - 2019 - Artificial Intelligence 276 (C):57-78.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  18
    Comparative Study of Imputation Algorithms Applied to the Prediction of Student Performance.Concepción Crespo-Turrado, José Luis Casteleiro-Roca, Fernando Sánchez-Lasheras, José Antonio López-Vázquez, Francisco Javier De Cos Juez, Francisco Javier Pérez Castelo, José Luis Calvo-Rolle & Emilio Corchado - forthcoming - Logic Journal of the IGPL.
    Student performance and its evaluation remain a serious challenge for education systems. Frequently, the recording and processing of students’ scores in a specific curriculum have several flaws for various reasons. In this context, the absence of data from some of the student scores undermines the efficiency of any future analysis carried out in order to reach conclusions. When this is the case, missing data imputation algorithms are needed. These algorithms are capable of substituting, with a high level of accuracy, the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Structural damage identification by a hybrid approach: variational method associated with parallel epidemic genetic algorithm.Haroldo F. de Campos Velho, L. D. Chiwiacowsky & S. B. M. Sambatti - 2006 - Scientia 17 (1).
    No categories
     
    Export citation  
     
    Bookmark  
  26. Adaptive control of manipulators with supervisión of the sampling rate and free design parameters of the adaptation algorithm.M. De la Sen & A. Almansa - 2002 - In Robert Trappl (ed.), Cybernetics and Systems. Austrian Society for Cybernetics Studies. pp. 751-780.
    No categories
     
    Export citation  
     
    Bookmark  
  27. Conference Report: Logic, Proofs and Algorithms.Ruy Jgb de Queiroz & Kátia Silva Guimaraes - 1998 - Logic Journal of the IGPL 6 (4):656-657.
  28.  9
    Democratic instance selection: A linear complexity instance selection algorithm based on classifier ensemble concepts.César García-Osorio, Aida de Haro-García & Nicolás García-Pedrajas - 2010 - Artificial Intelligence 174 (5-6):410-441.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  17
    Combining genetic algorithms and the finite element method to improve steel industrial processes.A. Sanz-García, A. V. Pernía-Espinoza, R. Fernández-Martínez & F. J. Martínez-de-Pisón-Ascacíbar - 2012 - Journal of Applied Logic 10 (4):298-308.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. A phenomenology and epistemology of large language models: Transparency, trust, and trustworthiness.Richard Heersmink, Barend de Rooij, María Jimena Clavel Vázquez & Matteo Colombo - forthcoming - Ethics and Information Technology.
    This paper analyses the phenomenology and epistemology of chatbots such as ChatGPT and Bard. The computational architecture underpinning these chatbots are large language models (LLMs), which are generative AI (Artificial Intelligence) systems trained on a massive dataset of text extracted from the Web. We conceptualise these LLMs as multifunctional computational cognitive artifacts, used for various cognitive tasks such as translating, summarizing, answering questions, information-seeking, and much more. Phenomenologically, LLMs can be experienced as a “quasi-other”; when that happens, users anthropomorphise them. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Multivariate Higher-Order IRT Model and MCMC Algorithm for Linking Individual Participant Data From Multiple Studies.Eun-Young Mun, Yan Huo, Helene R. White, Sumihiro Suzuki & Jimmy de la Torre - 2019 - Frontiers in Psychology 10.
    Many clinical and psychological constructs are conceptualized to have multivariate higher-order constructs that give rise to multidimensional lower-order traits. Although recent measurement models and computing algorithms can accommodate item response data with a higher-order structure, there are few measurement models and computing techniques that can be employed in the context of complex research synthesis, such as meta-analysis of individual participant data or integrative data analysis. The current study was aimed at modeling complex item responses that can arise when underlying domain-specific, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  28
    Causality and the Modeling of the Measurement Process in Quantum Theory.Christian de Ronde - 2017 - Disputatio 9 (47):657-690.
    In this paper we provide a general account of the causal models which attempt to provide a solution to the famous measurement problem of Quantum Mechanics. We will argue that—leaving aside instrumentalism which restricts the physical meaning of QM to the algorithmic prediction of measurement outcomes—the many interpretations which can be found in the literature can be distinguished through the way they model the measurement process, either in terms of the efficient cause or in terms of the final cause. We (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  33. Profiling vandalism in Wikipedia: A Schauerian approach to justification.Paul B. de Laat - 2016 - Ethics and Information Technology 18 (2):131-148.
    In order to fight massive vandalism the English- language Wikipedia has developed a system of surveillance which is carried out by humans and bots, supported by various tools. Central to the selection of edits for inspection is the process of using filters or profiles. Can this profiling be justified? On the basis of a careful reading of Frederick Schauer’s books about rules in general (1991) and profiling in particular (2003) I arrive at several conclusions. The effectiveness, efficiency, and risk-aversion of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34.  27
    Market Fairness: The Poor Country Cousin of Market Efficiency.Frederick H. de B. Harris, Sean Foley, Angelo Aspris & Michael J. Aitken - 2018 - Journal of Business Ethics 147 (1):5-23.
    Both fairness and efficiency are important considerations in market design and regulation, yet many regulators have neither defined nor measured these concepts. We develop an evidencebased policy framework in which these are both defined and measured using a series of empirical proxies. We then build a systems estimation model to examine the 2003–2011 explosive growth in algorithmic trading on the London Stock Exchange and NYSE Euronext Paris. Our results show that greater AT is associated with increased transactional efficiency and reduced (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  8
    Best-first fixed-depth minimax algorithms.Aske Plaat, Jonathan Schaeffer, Wim Pijls & Arie de Bruin - 1996 - Artificial Intelligence 87 (1-2):255-293.
  36.  20
    Parameter selection based on fuzzy logic to improve UAV path-following algorithms.Pablo Garcia-Aunon, Matilde Santos Peñas & Jesus Manuel de la Cruz García - 2017 - Journal of Applied Logic 24:62-75.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  14
    Using Game Description Language for mediated dispute resolution.Dave de Jonge, Tomas Trescak, Carles Sierra, Simeon Simoff & Ramon López de Mántaras - 2019 - AI and Society 34 (4):767-784.
    Mediation is a process in which two parties agree to resolve their dispute by negotiating over alternative solutions presented by a mediator. In order to construct such solutions, the mediator brings more information and knowledge, and, if possible, resources to the negotiation table. In order to do so, the mediator faces the challenge of determining which information is relevant to the current problem, given a vast database of knowledge. The contribution of this paper is the automated mediation machinery to resolve (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  60
    Explication as a Three-Step Procedure: the case of the Church-Turing Thesis.Matteo De Benedetto - 2021 - European Journal for Philosophy of Science 11 (1):1-28.
    In recent years two different axiomatic characterizations of the intuitive concept of effective calculability have been proposed, one by Sieg and the other by Dershowitz and Gurevich. Analyzing them from the perspective of Carnapian explication, I argue that these two characterizations explicate the intuitive notion of effective calculability in two different ways. I will trace back these two ways to Turing’s and Kolmogorov’s informal analyses of the intuitive notion of calculability and to their respective outputs: the notion of computorability and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  4
    Quelle transparence pour les algorithmes de justice prédictive?Élise Mouriesse - 2018 - Archives de Philosophie du Droit 60 (1):125-145.
    La contribution part du constat qu’il existe actuellement peu d’exigences de transparence en ce qui concerne les algorithmes de justice prédictive qui seraient mis à la disposition des juges judiciaires et administratifs pour adopter des décisions de justice, en dépit des propositions formulées en ce sens. Elle recherche pourquoi de telles exigences devraient être imposées et comment elles pourraient être concrétisées. Elle expose dans un premier temps les raisons pour lesquelles de telles exigences seraient souhaitables, en rappelant les nombreux risques (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  21
    The shift of Artificial Intelligence research from academia to industry: implications and possible future directions.Miguel Angelo de Abreu de Sousa - forthcoming - AI and Society:1-10.
    The movement of Artificial Intelligence (AI) research from universities to big corporations has had a significant impact on the development of the field. In the past, AI research was primarily conducted in academic institutions, which foster a culture of peer reviewing and collaboration to enhance quality improvements. The growing interest in AI among corporations, especially regarding Machine Learning (ML) technology, has shifted the focus of research from quality to quantity. Corporations have the resources to invest in large-scale ML projects and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41. Toward a Philosophy of Blockchain: A Symposium: Introduction.Melanie Swan & Primavera de Filippi - 2017 - Metaphilosophy 48 (5):603-619.
    This article introduces the symposium “Toward a Philosophy of Blockchain,” which provides a philosophical contemplation of blockchain technology, the digital ledger software underlying cryptocurrencies such as bitcoin, for the secure transfer of money, assets, and information via the Internet without needing a third-party intermediary. The symposium offers philosophical scholarship on a new topic, blockchain technology, from a variety of perspectives. The philosophical themes discussed include mathematical models of reality, signification, and the sociopolitical institutions that structure human life and interaction. The (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  42. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  85
    Event-by-Event Simulation of Einstein-Podolsky-Rosen-Bohm Experiments.Shuang Zhao, Hans De Raedt & Kristel Michielsen - 2008 - Foundations of Physics 38 (4):322-347.
    We construct an event-based computer simulation model of the Einstein-Podolsky-Rosen-Bohm experiments with photons. The algorithm is a one-to-one copy of the data gathering and analysis procedures used in real laboratory experiments. We consider two types of experiments, those with a source emitting photons with opposite but otherwise unpredictable polarization and those with a source emitting photons with fixed polarization. In the simulation, the choice of the direction of polarization measurement for each detection event is arbitrary. We use three different (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  9
    The Origins of Vowel Systems.Bart de Boer - 2001 - Oxford University Press UK.
    This book addresses universal tendencies of human vowel systems from the point of view of self-organisation. It uses computer simulations to show that the same universal tendencies found in human languages can be reproduced in a population of artificial agents. These agents learn and use vowels with human-like perception and production, using a learning algorithm that is cognitively plausible. The implications of these results for the evolution of language are then explored.
    Direct download  
     
    Export citation  
     
    Bookmark   14 citations  
  45.  34
    Realising Meaningful Human Control Over Automated Driving Systems: A Multidisciplinary Approach.Filippo Santoni de Sio, Giulio Mecacci, Simeon Calvert, Daniel Heikoop, Marjan Hagenzieker & Bart van Arem - 2023 - Minds and Machines 33 (4):587-611.
    The paper presents a framework to realise “meaningful human control” over Automated Driving Systems. The framework is based on an original synthesis of the results of the multidisciplinary research project “Meaningful Human Control over Automated Driving Systems” lead by a team of engineers, philosophers, and psychologists at Delft University of the Technology from 2017 to 2021. Meaningful human control aims at protecting safety and reducing responsibility gaps. The framework is based on the core assumption that human persons and institutions, not (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  14
    The “neo-intermediation” of large on-line platforms : Perspectives of analysis of the “state of health” of the digital information ecosystem.Isabella de Vivo - 2023 - Communications 48 (3):420-439.
    The key role played by online platforms in the neo-intermediation of the public debate requires a review of current tools for mapping the digital information ecosystem, highlighting the political nature of such an analysis: Starting from a synoptic overview of the main models of platform governance, we try to understand whether the ongoing European shift towards the Limited Government Regulation (LGR) model will be able to counterbalance the “systemic opinion power” of the giant platforms and restore the “health” of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Ethical assessments and mitigation strategies for biases in AI-systems used during the COVID-19 pandemic.Alicia De Manuel, Janet Delgado, Parra Jonou Iris, Txetxu Ausín, David Casacuberta, Maite Cruz Piqueras, Ariel Guersenzvaig, Cristian Moyano, David Rodríguez-Arias, Jon Rueda & Angel Puyol - 2023 - Big Data and Society 10 (1).
    The main aim of this article is to reflect on the impact of biases related to artificial intelligence (AI) systems developed to tackle issues arising from the COVID-19 pandemic, with special focus on those developed for triage and risk prediction. A secondary aim is to review assessment tools that have been developed to prevent biases in AI systems. In addition, we provide a conceptual clarification for some terms related to biases in this particular context. We focus mainly on nonracial biases (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  20
    Orchestrations of consciousness in the universe: Consciousness and electronic music applied to Xenolinguistics and Adnyamathanha aboriginal songs.Willard G. Van De Bogart - 2018 - Technoetic Arts 16 (1):113-131.
    This article deals with the reframing of the concept of universal mediated communication on a global scale. Subjects include the following: the universe has a conscious force field at all its scales, requiring continuous inter-scale communication of information; the field exhibits distinct electromagnetic frequencies associated with the building blocks of life; and advances in the technology of sound production with electronic synthesizers can be applied to study mechanisms of such universal communication. The question being addressed is how electronic synthesizers can (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  27
    Quantum Superpositions and Causality: On the Multiple Paths to the Measurement Result.Christian de Ronde - unknown
    The following analysis attempts to provide a general account of the multiple solutions given to the quantum measurement problem in terms of causality. Leaving aside instrumentalism which restricts its understanding of quantum mechanics to the algorithmic prediction of measurement outcomes, the many approaches which try to give an answer can be distinguished by their explanation based on the efficient cause —recovering in this way a classical physical description— or based on the final cause —which goes back to the hylomorphic tradition. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  5
    Advances in Modal Logic, Volume 3: Papers From the Third Aiml Conference, Held at the University of Leipzig, October 2000.Frank Wolter, H. Wansing, Maarten de Rijke & Michael Zakharyaschev - 2002 - Singapore: World Scientific.
1 — 50 / 961