Results for 'Ken'ichirō Takao'

1000+ found
Order:
  1.  9
    Shūkyō to fūki: "seinaru kihan" kara yomitoku gendai.Ken'ichirō Takao, Emi Gotō & Atsushi Koyanagi (eds.) - 2021 - Tōkyō-to Chiyoda-ku: Iwanami Shoten.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Keishiki imiron nyūmon: gengo, ronri, ninchi no sekai.Kenʼichirō Shirai - 1985 - Tōkyō: Sangyō Tosho.
     
    Export citation  
     
    Bookmark  
  3.  6
    Nō to kuoria: naze nō ni kokoro ga umareru no ka.Ken'ichirō Mogi - 2019 - Tōkyō-to Bunkyō-ku: Kabushiki Kaisha Kōdansha.
    ニューロン発火がなぜ「心」になるのか? 私が私であることの不思議、意識の謎に正面から挑んだ、茂木健一郎の核心!
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  22
    The Relationship Between Head Motion Synchronization and Empathy in Unidirectional Face-to-Face Communication.Takahiro Yokozuka, Eisuke Ono, Yuki Inoue, Ken-Ichiro Ogawa & Yoshihiro Miyake - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  60
    The simultaneous perception of auditory–tactile stimuli in voluntary movement.Qiao Hao, Taiki Ogata, Ken-Ichiro Ogawa, Jinhwan Kwon & Yoshihiro Miyake - 2015 - Frontiers in Psychology 6.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  6.  13
    Understanding psychology.Ken Richardson - 1988 - Philadelphia: Open University Press.
  7.  56
    A purely geometric module in the rat's spatial representation.Ken Cheng - 1986 - Cognition 23 (2):149-178.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   107 citations  
  8.  87
    Modeling Rational Players: Part I.Ken Binmore - 1987 - Economics and Philosophy 3 (2):179-214.
    Game theory has proved a useful tool in the study of simple economic models. However, numerous foundational issues remain unresolved. The situation is particularly confusing in respect of the non-cooperative analysis of games with some dynamic structure in which the choice of one move or another during the play of the game may convey valuable information to the other players. Without pausing for breath, it is easy to name at least 10 rival equilibrium notions for which a serious case can (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   62 citations  
  9. Do Conventions Need to Be Common Knowledge?Ken Binmore - 2008 - Topoi 27 (1-2):17-27.
    Do conventions need to be common knowledge in order to work? David Lewis builds this requirement into his definition of a convention. This paper explores the extent to which his approach finds support in the game theory literature. The knowledge formalism developed by Robert Aumann and others militates against Lewis’s approach, because it shows that it is almost impossible for something to become common knowledge in a large society. On the other hand, Ariel Rubinstein’s Email Game suggests that coordinated action (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  10. Trust across the life-span.Ken J. Rotenberg - 2001 - In Neil J. Smelser & Paul B. Baltes (eds.), International Encyclopedia of the Social and Behavioral Sciences. Elsevier. pp. 7866--7868.
     
    Export citation  
     
    Bookmark  
  11. Defending transitivity against zeno’s paradox.Ken Binmore & Alex Voorhoeve - 2003 - Philosophy and Public Affairs 31 (3):272–279.
    This article criticises one of Stuart Rachels' and Larry Temkin's arguments against the transitivity of 'better than'. This argument invokes our intuitions about our preferences of different bundles of pleasurable or painful experiences of varying intensity and duration, which, it is argued, will typically be intransitive. This article defends the transitivity of 'better than' by showing that Rachels and Temkin are mistaken to suppose that preferences satisfying their assumptions must be intransitive. It makes cler where the argument goes wrong by (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  12.  22
    Family-Supportive Supervisor Behavior, Felt Obligation, and Unethical Pro-family Behavior: The Moderating Role of Positive Reciprocity Beliefs.Ken Cheng, Qianlin Zhu & Yinghui Lin - 2022 - Journal of Business Ethics 177 (2):261-273.
    Drawing on social exchange theory, we argue that family-supportive supervisor behavior (FSSB) inhibits employees’ unethical pro-family behavior (UPFB) via the mediation of felt obligation. We further propose that employees’ positive reciprocity beliefs strengthen the hypothesized relationships. Using a sample consisting of 345 full-time employees from an Internet service company located in China, we found that felt obligation partially mediated the negative relationship between FSSB and UPFB and that the FSSB-felt obligation relationship and the mediation relationship were stronger for employees with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  17
    The Leisure of Young People in Contemporary Society.Ken Roberts - 2012 - Arbor 188 (754):327-337.
  14.  13
    Go back to cognitive theory.Ken Richardson - 1990 - Behavioral and Brain Sciences 13 (1):193-194.
  15.  15
    The ins and outs of listening as a psychoanalyst.Ken Robinson - 2015 - Empedocles: European Journal for the Philosophy of Communication 6 (2):169-184.
    In this article I shall give a brief account of psychoanalytic listening. I shall then consider the ontology of such listening to a session and compare it to the ontology of attending to paintings and poems. Psychoanalysts are interested not merely in what is understood through listening but in the process of listening. I shall proceed to ask how possible it is to represent that process. Finally, I raise some questions about how the capacity to listen psychoanalytically might be taught (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  35
    An open letter to institutional review boards considering northfield laboratories' polyheme® trial.Ken Kipnis, Nancy M. P. King & Robert M. Nelson - 2006 - American Journal of Bioethics 6 (3):18 – 21.
    At the time of this writing, a widely publicized, waived-consent trial is underway. Sponsored by Northfield Laboratories, Inc. (Evanston, IL) the trial is intended to evaluate the emergency use of PolyHeme®, an oxygen-carrying resuscitative fluid that might prevent deaths from uncontrolled bleeding. The protocol allows patients in hemorrhagic shock to be randomized between PolyHeme® and saline in the field and, still without consent, randomized between PolyHeme® and blood after arrival at an emergency department. The Federal regulations that govern the waiver (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  17.  61
    Modeling Rational Players: Part II.Ken Binmore - 1988 - Economics and Philosophy 4 (1):9-55.
    This is the second part of a two-part paper. It can be read independently of the first part provided that the reader is prepared to go along with the unorthodox views on game theory which were advanced in Part I and are summarized below. The body of the paper is an attempt to study some of the positive implications of such a viewpoint. This requires an exploration of what is involved in modeling “rational players” as computing machines.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  18.  3
    Human dignity and medicine: proceedings of the Fukui Bioethics Seminar held in Fukui, Japan, 10-12 April 1987.Jean Bernard, Kinʾichirō Kajikawa & Norio Fujiki (eds.) - 1988 - New York: Excerpta Medica.
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  13
    GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based provenance, quantum-resistant algorithms, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  37
    Logical content and empirical significance.Ken Gemes - 1998 - In Paul Weingartner, Gerhard Schurz & Georg Dorn (eds.), The Role of Pragmatics in Contemporary Philosophy: Proceedings of the 20th International Wittgenstein Symposium, 10-16 August 1997, Kirchberg am Wechsel (Austria). Verlag Halder-Pichler-Tempsky.
    In this paper I will investigate the possibility of completing a Positivist style account of demarcation. One reason for pursuing this project is that standard criticisms of Positivism do not have the bite against the demarcation project that they are often assumed to have. To argue this will be the burden of the first part of this paper. The other reason is that new research in logic has provided machinery not available to the Positivists; machinery that shows promise for solving (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Chōetsuron tetsugaku to wa nani ka =.Yōichirō Ōhashi, Yoshimichi Nakajima & Fumiyasu Ishikawa (eds.) - 1989 - Tōkyō: Risōsha.
     
    Export citation  
     
    Bookmark  
  22.  4
    Posutomodan no shisōteki konkyo: 9.11 to kanri shakai.Yūichirō Okamoto - 2005 - Kyōto-shi: Nakanishiya Shuppan.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  16
    Introduction.Ken Alder - 2007 - Isis 98 (1):80-83.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  30
    Life and death.Ken Binmore - 2016 - Economics and Philosophy 32 (1):75-97.
  25.  48
    Game Theory and Business Ethics.Ken Binmore - 1999 - Business Ethics Quarterly 9 (1):31-35.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  26.  38
    The ethical challenge of management buy-outs as a form of privatisation in central and eastern europe.Igor Filatotchev, Ken Starkey & Mike Wright - 1994 - Journal of Business Ethics 13 (7):523 - 532.
    There has been a growing debate about the ethics of management buy-outs (MBOs). One possible criticism of the MBO is that it serves the interests of incumbent management at the expense of shareholders. In this paper we develop the general arguments concerning the ethical aspects of the MBO to include other forms of buy-out beyond going privates and apply the analysis to MBOs as a mode of privatisation in Central and Eastern Europe (CEE). MBOs are justified in this context postperestroika (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  27. Economic man – or straw man?Ken Binmore - 2005 - Behavioral and Brain Sciences 28 (6):817-818.
    The target article by Henrich et al. describes some economic experiments carried out in fifteen small-scale societies. The results are broadly supportive of an approach to understanding social norms that is commonplace among game theorists. It is therefore perverse that the rhetorical part of the paper should be devoted largely to claiming that “economic man” is an experimental failure that needs to be replaced by an alternative paradigm. This brief commentary contests the paper's caricature of economic theory, and offers a (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  28.  12
    Hō jisshō shugi no gendaiteki tenkai.Shin'ichirō Hama - 2014 - Tōkyō-to Shinjuku-ku: Seibundō.
    法に対して合理的で批判的な姿勢を吹き込もうとする試み。ハート=ドゥオーキン論争以降の「法実証主義の現代的展開」を描き出す。本書ではとくに、ハートの理論的継承者であるラズおよびマーモーの議論に注目する。 .
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. Dōjisei no mondai.Senʾichirō Higashi - 1975
    No categories
     
    Export citation  
     
    Bookmark  
  30. Sarutoru to Maruseru.Kyōichirō Hirose - 1970
    No categories
     
    Export citation  
     
    Bookmark  
  31.  19
    Generative AI Security: Theories and Practices.Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.) - 2024 - Springer Nature Switzerland.
    This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  79
    Browsing Alone: The Differential Impact of Internet Platforms on Political Participation.Ken'ichi Ikeda, Sean Richey & Holly Teresi - 2013 - Japanese Journal of Political Science 14 (3):305-319.
    We research the political impact of how users access the Internet. Recent research suggests that Internet usage may promote political participation. Internet usage is proposed to be beneficial because it increases activity in diverse politicized social networks and through greater access to information. Even though Internet usage may begin as a non-political activity, we outline several reasons to believe that it may spark later political participation. This impact, however, is likely to be non-existent in new forms of Internet browsing such (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  33.  26
    Ellis S. Krauss Broadcasting Politics in Japan: NHK and Television News, Ithaca, NY: Cornell University Press, 2000.Ken'ichi Ikeda - 2001 - Japanese Journal of Political Science 2 (2):257-271.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  34.  10
    Sport and Friendship.Ken Jones - 2001 - Journal of Philosophy of Education 35 (1):131-140.
    My aim in this paper is to make the case for encouraging friendship in sport. First, I argue that sport is especially conducive to friendship. Second, I argue that since friendship is life-enhancing then to participate in sport and not to have made friends is to have failed to take a life-enhancing opportunity. Third, I argue that there are sporting benefits to be had from sporting friendships. Finally, I say something about the role of friendship in sport achieving its broad (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  16
    Trust in Sport.Ken Jones - 2001 - Journal of the Philosophy of Sport 28 (1):96-102.
  36.  53
    Trinity and Religious Pluralism: The Doctrine of the Trinity in Christian Theology of Religions. By Veli-Matti Kärkkäinen.Ken Alan Jung - 2011 - Heythrop Journal 52 (5):838-839.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Race and Racism: No Dogs or Philosophers Allowed.Ken Knisely, Leonard Harris, Naomi Zack & Hugh Taft-Morales - forthcoming - DVD.
    Is racism an act of the will? A disease? A bad habit? A result of lost virtues or of historical economic forces? Can we reliably claim that racism is an affront to justice? How does our scientific understanding of "race" affect our ethical considerations ? How can we ever know if we are acting from racist assumptions? With Leonard Harris, Naomi Zack, and Hugh Taft-Morales.
     
    Export citation  
     
    Bookmark   1 citation  
  38. 山崎闇斎の世界.Yūichirō Tajiri - 2006 - Tōkyō: Perikansha.
     
    Export citation  
     
    Bookmark  
  39.  12
    How do taste cells lacking synapses mediate neurotransmission? CALHM1, a voltage‐gated ATP channel.Akiyuki Taruno, Ichiro Matsumoto, Zhongming Ma, Philippe Marambaud & J. Kevin Foskett - 2013 - Bioessays 35 (12):1111-1118.
    CALHM1 was recently demonstrated to be a voltage‐gated ATP‐permeable ion channel and to serve as a bona fide conduit for ATP release from sweet‐, umami‐, and bitter‐sensing type II taste cells. Calhm1 is expressed in taste buds exclusively in type II cells and its product has structural and functional similarities with connexins and pannexins, two families of channel protein candidates for ATP release by type II cells. Calhm1 knockout in mice leads to loss of perception of sweet, umami, and bitter (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  7
    America’s Two Gadgets.Ken Alder - 2007 - Isis 98 (1):124-137.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  7
    History’s Greatest Forger: Science, Fiction, and Fraud along the Seine.Ken Alder - 2004 - Critical Inquiry 30 (4):702.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Laser scanning yields Digital as-builds.Wicker Ken - 2005 - In Alan Blackwell & David MacKay (eds.), Power. New York: Cambridge University Press. pp. 149--3.
    No categories
     
    Export citation  
     
    Bookmark  
  43. Metaphysics and magic.Fergus Ken - 1997 - In Phillip Blond (ed.), Post-Secular Philosophy: Between Philosophy and Theology. New York: Routledge. pp. 240.
    No categories
     
    Export citation  
     
    Bookmark  
  44.  26
    The Problem of Social Cost: Coase's economics versus ethics.Ken Hanly - 1992 - Journal of Applied Philosophy 9 (1):77-83.
    ABSTRACT Coase's now famous paper, ‘The Problem of Social Cost’, argues that social harms caused by industry are best addressed through a policy which would be optimal in terms of market efficiency. I argue that this narrowly based policy represents a classic example of the failure of many welfare economists to consider adequately the ethical implications of their recommendations. I also indicate the manner in which Coase's recommendations conflict with intuitively well‐established ethical principles. I conclude that only an approach that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  24
    Response to Open Peer Commentaries on “An Open Letter to Institutional Review Boards Considering Northfield Laboratories' PolyHeme® Trial ”: The Emergency Exception and Unproven/Unsatisfactory Treatment.Ken Kipnis, Nancy M. P. King & Robert M. Nelson - 2006 - American Journal of Bioethics 6 (3):W49-W50.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  19
    Response to Open Peer Commentaries on “An Open Letter to Institutional Review Boards Considering Northfield Laboratories' PolyHeme® Trial”: The Emergency Exception and Unproven/unsatisfactory Treatment.Ken Kipnis, Nancy M. P. King & Robert M. Nelson - 2006 - American Journal of Bioethics 6 (3):W49-W50.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  11
    To the Editor.Ken Kipnis - 2010 - Hastings Center Report 40 (3):7-7.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  63
    When are you dead?Ken Kipnis - 2004 - The Philosophers' Magazine 27 (27):41-42.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Boundaries of Life: No Dogs or Philosophers Allowed.Ken Knisely, Peter Caws & Sr Regina Geiger - forthcoming - DVD.
    How should we think about the beginnings and endings of humans' biological lives? Is an ethical system based on natural law the only way to safeguard the value of individual human life? Does holding a secular perspective on the boundaries of human life necessarily leave one on a slippery slope? With Peter Caws and Sr. Regina Geiger.
     
    Export citation  
     
    Bookmark  
  50. Computer Ethics: Encryption: Dvd.Ken Knisely & Patrick Sullivan - 2001 - Milk Bottle Productions.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000